Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 15:29

General

  • Target

    074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe

  • Size

    1015KB

  • MD5

    074b37dbc85dcc235f8f6f33a1d56953

  • SHA1

    e36b7444d38ad4026937824101ce5e6c17a1dc19

  • SHA256

    a9e50afef81424a18bc6013efabd3710f0e74d32a2ea8bf031e27b7f59ff2d03

  • SHA512

    cd3f83604ed6f9e845ebcc8adc428a428888d76e879f84e011cb1b2633231ea7415028526d43bf997c61f4e1722c239f677dd77b8be1adb136da39c6ac7d2b82

  • SSDEEP

    24576:PaMw2WWeFcfbP9VPSPMTSPL/rWvzq4JJfpks6SXsa:dLbVMTrOq4YSXsa

Malware Config

Extracted

Family

darkcomet

Botnet

all.tamashi.ge

C2

jajaxparkour.no-ip.org:81

jajaxparkour.no-ip.org:82

jajaxparkour.no-ip.org:83

Mutex

DC_MUTEX-HNXAZ4N

Attributes
  • InstallPath

    msdcsc.exe

  • gencode

    JmA4p7WaU7N1

  • install

    true

  • offline_keylogger

    true

  • password

    jajaXparkourjajaXparkour

  • persistence

    true

  • reg_key

    WinUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 51 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe
      "C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe"
      2⤵
      • Executes dropped EXE
      PID:2004
    • C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
      "C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3368
      • C:\Windows\svchost.exe
        "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4904
        • C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
          "C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Drops file in Drivers directory
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4208
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe" +s +h
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1588
            • C:\Windows\SysWOW64\attrib.exe
              attrib "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\alltamashige.exe" +s +h
              6⤵
              • Sets file to hidden
              • Views/modifies file attributes
              PID:1996
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\%temp%" +s +h
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3424
            • C:\Windows\SysWOW64\attrib.exe
              attrib "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp" +s +h
              6⤵
              • Sets file to hidden
              • Views/modifies file attributes
              PID:2412
          • C:\Windows\msdcsc.exe
            "C:\Windows\msdcsc.exe"
            5⤵
            • Modifies firewall policy service
            • Modifies security service
            • Windows security bypass
            • Executes dropped EXE
            • Windows security modification
            • Adds Run key to start application
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3588
            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
              "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
              6⤵
                PID:4092
              • C:\Windows\explorer.exe
                "C:\Windows\explorer.exe"
                6⤵
                  PID:4772
                • C:\Windows\notepad.exe
                  notepad
                  6⤵
                    PID:1768
        • C:\Windows\svchost.exe
          C:\Windows\svchost.exe
          1⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:4352

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Persistence

        Boot or Logon Autostart Execution

        2
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Winlogon Helper DLL

        1
        T1547.004

        Create or Modify System Process

        2
        T1543

        Windows Service

        2
        T1543.003

        Privilege Escalation

        Boot or Logon Autostart Execution

        2
        T1547

        Registry Run Keys / Startup Folder

        1
        T1547.001

        Winlogon Helper DLL

        1
        T1547.004

        Create or Modify System Process

        2
        T1543

        Windows Service

        2
        T1543.003

        Defense Evasion

        Modify Registry

        6
        T1112

        Impair Defenses

        3
        T1562

        Disable or Modify Tools

        2
        T1562.001

        Disable or Modify System Firewall

        1
        T1562.004

        Hide Artifacts

        2
        T1564

        Hidden Files and Directories

        2
        T1564.001

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        2
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
          Filesize

          697KB

          MD5

          25a7087745e3be52602ed9a2b753fb92

          SHA1

          9baf48e9603f4a4e478a856bd2bf08a0522001f3

          SHA256

          c93cc41f09f3fc4dcbe7013e1705fad1f54ffea6978cc53935a5c426cb271a0e

          SHA512

          ee04c15369a18f5c8b858fb7c441ed47f955d13e8048ee19ca23aa701bf6786c414944a36f0967c640723f493aabc62b2c9d9484067b4f8874a050eef3a8a65e

        • C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
          Filesize

          661KB

          MD5

          4caab89f32f901eea758095fc05173d5

          SHA1

          f1440d734982b2f7d3536f8a0ea2246f3b2ff8e4

          SHA256

          13e040a602b573848e1d9a6f60944271efcff6251c25a39f9aa98eb2c77dc477

          SHA512

          73713e2edd11203c2359181621032565197912b144cb0d3177a1f796a413e7fd1a698c964b45a0774647d1bc4b085d90bc7521535dd7e9989bb4b7d5fda75e33

        • C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe
          Filesize

          295KB

          MD5

          ad7b9c14083b52bc532fba5948342b98

          SHA1

          ee8cbf12d87c4d388f09b4f69bed2e91682920b5

          SHA256

          17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae

          SHA512

          e12aad20c824187b39edb3c7943709290b5ddbf1b4032988db46f2e86da3cf7e7783f78c82e4dc5da232f666b8f9799a260a1f8e2694eb4d0cdaf78da710fde1

        • C:\Windows\svchost.exe
          Filesize

          35KB

          MD5

          9e3c13b6556d5636b745d3e466d47467

          SHA1

          2ac1c19e268c49bc508f83fe3d20f495deb3e538

          SHA256

          20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

          SHA512

          5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

        • memory/3368-28-0x0000000000400000-0x0000000000411000-memory.dmp
          Filesize

          68KB

        • memory/3588-70-0x0000000000400000-0x00000000004B5000-memory.dmp
          Filesize

          724KB

        • memory/3588-66-0x0000000000400000-0x00000000004B5000-memory.dmp
          Filesize

          724KB

        • memory/3588-82-0x0000000000400000-0x00000000004B5000-memory.dmp
          Filesize

          724KB

        • memory/3588-80-0x0000000000400000-0x00000000004B5000-memory.dmp
          Filesize

          724KB

        • memory/3588-78-0x0000000000400000-0x00000000004B5000-memory.dmp
          Filesize

          724KB

        • memory/3588-56-0x0000000000400000-0x00000000004B5000-memory.dmp
          Filesize

          724KB

        • memory/3588-58-0x0000000000400000-0x00000000004B5000-memory.dmp
          Filesize

          724KB

        • memory/3588-60-0x0000000000400000-0x00000000004B5000-memory.dmp
          Filesize

          724KB

        • memory/3588-62-0x0000000000400000-0x00000000004B5000-memory.dmp
          Filesize

          724KB

        • memory/3588-64-0x0000000000400000-0x00000000004B5000-memory.dmp
          Filesize

          724KB

        • memory/3588-76-0x0000000000400000-0x00000000004B5000-memory.dmp
          Filesize

          724KB

        • memory/3588-74-0x0000000000400000-0x00000000004B5000-memory.dmp
          Filesize

          724KB

        • memory/3588-68-0x0000000000400000-0x00000000004B5000-memory.dmp
          Filesize

          724KB

        • memory/3588-72-0x0000000000400000-0x00000000004B5000-memory.dmp
          Filesize

          724KB

        • memory/4208-53-0x0000000000400000-0x00000000004B5000-memory.dmp
          Filesize

          724KB

        • memory/4208-37-0x00000000022B0000-0x00000000022B1000-memory.dmp
          Filesize

          4KB

        • memory/4352-73-0x0000000000400000-0x000000000040D000-memory.dmp
          Filesize

          52KB

        • memory/4352-65-0x0000000000400000-0x000000000040D000-memory.dmp
          Filesize

          52KB

        • memory/4352-55-0x0000000000400000-0x000000000040D000-memory.dmp
          Filesize

          52KB

        • memory/4904-36-0x0000000000400000-0x000000000040D000-memory.dmp
          Filesize

          52KB

        • memory/5112-25-0x0000000000400000-0x000000000040D000-memory.dmp
          Filesize

          52KB