Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 06:59

General

  • Target

    03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    03d6a067416e684cba893542c4ff1094

  • SHA1

    ad1540618c02545b54b3d6f6785d565569c17ab7

  • SHA256

    5ab8d01b8144e70ab1e5720ec8e672695068439c8e65b7bd884944117aa00e40

  • SHA512

    7ed26f125ec87ed34131e31352132d2b4dd8aff850cb5b2a38420b7d77ccf430be9b222aa0c2e83fcd5aa401a0a521ae588524481b0a66fd3f452b447fa3c2e5

  • SSDEEP

    24576:BzNYD0Wr6ULip3Z/A7nDTz+KHfAcV8towmD0Wr6sP7:tqD0W9iZMnDpfAu1D0W9

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • ModiLoader Second Stage 7 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe
        "C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4820
        • C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe
          "C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe"
          4⤵
          • Executes dropped EXE
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2260
          • C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe
            "C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe"
            5⤵
            • Modifies WinLogon for persistence
            • Checks computer location settings
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4940
            • C:\Users\Admin\AppData\Roaming\svchost.exe
              "C:\Users\Admin\AppData\Roaming\svchost.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of SetWindowsHookEx
              PID:4560
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                7⤵
                • Executes dropped EXE
                • Writes to the Master Boot Record (MBR)
                • Suspicious use of SetThreadContext
                • Suspicious use of SetWindowsHookEx
                PID:3320
                • C:\Users\Admin\AppData\Roaming\svchost.exe
                  "C:\Users\Admin\AppData\Roaming\svchost.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2932
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe"
              6⤵
                PID:3032
                • C:\Windows\SysWOW64\PING.EXE
                  ping 127.0.0.1 -n 5
                  7⤵
                  • Runs ping.exe
                  PID:3444
        • C:\Users\Admin\AppData\Local\Temp\d48z.exe
          "C:\Users\Admin\AppData\Local\Temp\d48z.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:976
          • C:\Users\Admin\AppData\Local\Temp\d48z.exe
            "C:\Users\Admin\AppData\Local\Temp\d48z.exe"
            4⤵
            • Executes dropped EXE
            • Writes to the Master Boot Record (MBR)
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2472
            • C:\Users\Admin\AppData\Local\Temp\d48z.exe
              "C:\Users\Admin\AppData\Local\Temp\d48z.exe"
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:4232
              • C:\Users\Admin\AppData\Roaming\met start.exe
                "C:\Users\Admin\AppData\Roaming\met start.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of SetWindowsHookEx
                PID:1948
                • C:\Users\Admin\AppData\Roaming\met start.exe
                  "C:\Users\Admin\AppData\Roaming\met start.exe"
                  7⤵
                  • Executes dropped EXE
                  • Writes to the Master Boot Record (MBR)
                  • Suspicious use of SetThreadContext
                  • Suspicious use of SetWindowsHookEx
                  PID:1268
                  • C:\Users\Admin\AppData\Roaming\met start.exe
                    "C:\Users\Admin\AppData\Roaming\met start.exe"
                    8⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    PID:2516

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    2
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Winlogon Helper DLL

    1
    T1547.004

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Privilege Escalation

    Boot or Logon Autostart Execution

    2
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Winlogon Helper DLL

    1
    T1547.004

    Defense Evasion

    Modify Registry

    2
    T1112

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Remote System Discovery

    1
    T1018

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\d48z.exe
      Filesize

      240KB

      MD5

      c7e2e7f78d3176794bfd37c571552c5d

      SHA1

      5ade0c1a932080dc28982e9ac751ef40a819bfab

      SHA256

      b148721896f9a0fbb6113e5c381dd2555dbbb37d72c780a6ca09b2639e20e876

      SHA512

      f0b9e1d64c5484cd1073c8cdf65f3c8921fe1588137137de0a3d3bcdb2818441fd0e2ddb7d8b189ef879b3303804438e615ed79398e2c5a8aa254d6428b9848a

    • C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe
      Filesize

      852KB

      MD5

      dc11a2ac0e7fda0d531fcd4350b6b56f

      SHA1

      32bf2255a2397c4bae5e9250260ce9b2c2a901c4

      SHA256

      fb708bf5cb6e60a45fbe23446b723b79ca3b1720f567afca5c5cd57c07ccb23c

      SHA512

      a4a569fcdf977dd1e5b01416b69a04f53af190dd0d956f3ffca6101f8af62d8bc47052ede34f3ba395e683aeae3669e609a44812753e8d4818cf1eb1e0698e7f

    • memory/976-31-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/1268-108-0x0000000000400000-0x0000000000415000-memory.dmp
      Filesize

      84KB

    • memory/1268-102-0x0000000000400000-0x0000000000415000-memory.dmp
      Filesize

      84KB

    • memory/1948-78-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/2260-48-0x0000000000400000-0x00000000004AE000-memory.dmp
      Filesize

      696KB

    • memory/2260-55-0x0000000000400000-0x00000000004AE000-memory.dmp
      Filesize

      696KB

    • memory/2260-66-0x0000000000400000-0x00000000004AE000-memory.dmp
      Filesize

      696KB

    • memory/2472-42-0x0000000000400000-0x0000000000415000-memory.dmp
      Filesize

      84KB

    • memory/2472-39-0x0000000000400000-0x0000000000415000-memory.dmp
      Filesize

      84KB

    • memory/2472-58-0x0000000000400000-0x0000000000415000-memory.dmp
      Filesize

      84KB

    • memory/2496-0-0x0000000000400000-0x0000000000544000-memory.dmp
      Filesize

      1.3MB

    • memory/2516-120-0x0000000000400000-0x000000000040F000-memory.dmp
      Filesize

      60KB

    • memory/2516-107-0x0000000000400000-0x000000000040F000-memory.dmp
      Filesize

      60KB

    • memory/2860-5-0x0000000000400000-0x000000000051D000-memory.dmp
      Filesize

      1.1MB

    • memory/2860-38-0x0000000000400000-0x000000000051D000-memory.dmp
      Filesize

      1.1MB

    • memory/2860-3-0x0000000000400000-0x000000000051D000-memory.dmp
      Filesize

      1.1MB

    • memory/2932-122-0x0000000000400000-0x00000000004B3000-memory.dmp
      Filesize

      716KB

    • memory/2932-125-0x0000000000400000-0x00000000004B3000-memory.dmp
      Filesize

      716KB

    • memory/2932-140-0x0000000000400000-0x00000000004B3000-memory.dmp
      Filesize

      716KB

    • memory/2932-137-0x0000000000400000-0x00000000004B3000-memory.dmp
      Filesize

      716KB

    • memory/2932-134-0x0000000000400000-0x00000000004B3000-memory.dmp
      Filesize

      716KB

    • memory/2932-131-0x0000000000400000-0x00000000004B3000-memory.dmp
      Filesize

      716KB

    • memory/2932-128-0x0000000000400000-0x00000000004B3000-memory.dmp
      Filesize

      716KB

    • memory/2932-118-0x0000000000400000-0x00000000004B3000-memory.dmp
      Filesize

      716KB

    • memory/2932-119-0x0000000000400000-0x00000000004B3000-memory.dmp
      Filesize

      716KB

    • memory/2932-117-0x0000000000400000-0x00000000004B3000-memory.dmp
      Filesize

      716KB

    • memory/3320-112-0x0000000000400000-0x00000000004AE000-memory.dmp
      Filesize

      696KB

    • memory/3320-121-0x0000000000400000-0x00000000004AE000-memory.dmp
      Filesize

      696KB

    • memory/4232-50-0x0000000000400000-0x000000000040F000-memory.dmp
      Filesize

      60KB

    • memory/4232-47-0x0000000000400000-0x000000000040F000-memory.dmp
      Filesize

      60KB

    • memory/4232-45-0x0000000000400000-0x000000000040F000-memory.dmp
      Filesize

      60KB

    • memory/4232-53-0x0000000000400000-0x000000000040F000-memory.dmp
      Filesize

      60KB

    • memory/4232-81-0x0000000000400000-0x000000000040F000-memory.dmp
      Filesize

      60KB

    • memory/4560-95-0x0000000000400000-0x00000000004D5000-memory.dmp
      Filesize

      852KB

    • memory/4820-20-0x0000000000400000-0x00000000004D5000-memory.dmp
      Filesize

      852KB

    • memory/4940-61-0x0000000000400000-0x00000000004B3000-memory.dmp
      Filesize

      716KB

    • memory/4940-63-0x0000000000400000-0x00000000004B3000-memory.dmp
      Filesize

      716KB

    • memory/4940-98-0x0000000000400000-0x00000000004B3000-memory.dmp
      Filesize

      716KB