Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    20-06-2024 06:59

General

  • Target

    03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    03d6a067416e684cba893542c4ff1094

  • SHA1

    ad1540618c02545b54b3d6f6785d565569c17ab7

  • SHA256

    5ab8d01b8144e70ab1e5720ec8e672695068439c8e65b7bd884944117aa00e40

  • SHA512

    7ed26f125ec87ed34131e31352132d2b4dd8aff850cb5b2a38420b7d77ccf430be9b222aa0c2e83fcd5aa401a0a521ae588524481b0a66fd3f452b447fa3c2e5

  • SSDEEP

    24576:BzNYD0Wr6ULip3Z/A7nDTz+KHfAcV8towmD0Wr6sP7:tqD0W9iZMnDpfAu1D0W9

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • ModiLoader Second Stage 10 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe
        "C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2128
        • C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe
          "C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2952
          • C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe
            "C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe"
            5⤵
            • Modifies WinLogon for persistence
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            PID:2428
            • C:\Users\Admin\AppData\Roaming\svchost.exe
              "C:\Users\Admin\AppData\Roaming\svchost.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of SetWindowsHookEx
              PID:2840
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                7⤵
                • Executes dropped EXE
                • Writes to the Master Boot Record (MBR)
                • Suspicious use of SetThreadContext
                • Suspicious use of SetWindowsHookEx
                PID:540
                • C:\Users\Admin\AppData\Roaming\svchost.exe
                  "C:\Users\Admin\AppData\Roaming\svchost.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1484
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe"
              6⤵
                PID:2696
                • C:\Windows\SysWOW64\PING.EXE
                  ping 127.0.0.1 -n 5
                  7⤵
                  • Runs ping.exe
                  PID:2112
        • C:\Users\Admin\AppData\Local\Temp\d48z.exe
          "C:\Users\Admin\AppData\Local\Temp\d48z.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2736
          • C:\Users\Admin\AppData\Local\Temp\d48z.exe
            "C:\Users\Admin\AppData\Local\Temp\d48z.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Writes to the Master Boot Record (MBR)
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2680
            • C:\Users\Admin\AppData\Local\Temp\d48z.exe
              "C:\Users\Admin\AppData\Local\Temp\d48z.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:2524
              • C:\Users\Admin\AppData\Roaming\met start.exe
                "C:\Users\Admin\AppData\Roaming\met start.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of SetWindowsHookEx
                PID:2592
                • C:\Users\Admin\AppData\Roaming\met start.exe
                  "C:\Users\Admin\AppData\Roaming\met start.exe"
                  7⤵
                  • Executes dropped EXE
                  • Writes to the Master Boot Record (MBR)
                  • Suspicious use of SetThreadContext
                  • Suspicious use of SetWindowsHookEx
                  PID:628
                  • C:\Users\Admin\AppData\Roaming\met start.exe
                    "C:\Users\Admin\AppData\Roaming\met start.exe"
                    8⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    PID:1308

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\d48z.exe

      Filesize

      240KB

      MD5

      c7e2e7f78d3176794bfd37c571552c5d

      SHA1

      5ade0c1a932080dc28982e9ac751ef40a819bfab

      SHA256

      b148721896f9a0fbb6113e5c381dd2555dbbb37d72c780a6ca09b2639e20e876

      SHA512

      f0b9e1d64c5484cd1073c8cdf65f3c8921fe1588137137de0a3d3bcdb2818441fd0e2ddb7d8b189ef879b3303804438e615ed79398e2c5a8aa254d6428b9848a

    • C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe

      Filesize

      852KB

      MD5

      dc11a2ac0e7fda0d531fcd4350b6b56f

      SHA1

      32bf2255a2397c4bae5e9250260ce9b2c2a901c4

      SHA256

      fb708bf5cb6e60a45fbe23446b723b79ca3b1720f567afca5c5cd57c07ccb23c

      SHA512

      a4a569fcdf977dd1e5b01416b69a04f53af190dd0d956f3ffca6101f8af62d8bc47052ede34f3ba395e683aeae3669e609a44812753e8d4818cf1eb1e0698e7f

    • memory/1704-3-0x0000000000400000-0x000000000051D000-memory.dmp

      Filesize

      1.1MB

    • memory/1704-7-0x0000000000400000-0x000000000051D000-memory.dmp

      Filesize

      1.1MB

    • memory/1704-13-0x0000000000400000-0x000000000051D000-memory.dmp

      Filesize

      1.1MB

    • memory/1704-15-0x0000000000400000-0x000000000051D000-memory.dmp

      Filesize

      1.1MB

    • memory/1704-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1704-5-0x0000000000400000-0x000000000051D000-memory.dmp

      Filesize

      1.1MB

    • memory/1704-40-0x0000000000400000-0x000000000051D000-memory.dmp

      Filesize

      1.1MB

    • memory/2128-37-0x0000000000400000-0x00000000004D5000-memory.dmp

      Filesize

      852KB

    • memory/2524-64-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2524-66-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2524-74-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2524-76-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2524-80-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2524-88-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2524-70-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2524-83-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2524-82-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2524-68-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2524-101-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2524-72-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2680-48-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/2680-91-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/2680-46-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/2680-50-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/2680-56-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/2680-60-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/2716-0-0x0000000000400000-0x0000000000544000-memory.dmp

      Filesize

      1.3MB

    • memory/2736-36-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/2952-105-0x0000000000400000-0x00000000004AE000-memory.dmp

      Filesize

      696KB

    • memory/2952-106-0x0000000000400000-0x00000000004AE000-memory.dmp

      Filesize

      696KB

    • memory/2952-108-0x0000000000400000-0x00000000004AE000-memory.dmp

      Filesize

      696KB

    • memory/2952-113-0x0000000000400000-0x00000000004AE000-memory.dmp

      Filesize

      696KB