Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 10:09

General

  • Target

    07e1cdae1fe659073ab973ccaa0f6cfa_JaffaCakes118.exe

  • Size

    900KB

  • MD5

    07e1cdae1fe659073ab973ccaa0f6cfa

  • SHA1

    ef35c83fb52da9613da55bab5be341a3cd17cb77

  • SHA256

    fccc80de0fc9ba246902bbec6c5189c7d14aa7617b203bb7b1ca58ac25dbb0e8

  • SHA512

    7e029bf1b3cf5c048af80f8576a03d0dff1402c50b1d2fff7b3267275dfe3310e8f83fce68731431d0d65ba1e4c538503ccc11e43478ca276119a584137383f7

  • SSDEEP

    24576:ZLy+fKU/f9MToBsDnhYkrChHbjs/SDfk:ZyIKtoBHbFk

Malware Config

Extracted

Family

darkcomet

Botnet

config1

C2

domovian.no-ip.biz:110

Mutex

DC_MUTEX-HD40HNR

Attributes
  • gencode

    q6wies1bdznu

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Drops file in Drivers directory 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07e1cdae1fe659073ab973ccaa0f6cfa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\07e1cdae1fe659073ab973ccaa0f6cfa_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
        "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\CONFIG.XML"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2488
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3028
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2504

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          063f47c06cfc22bac53e731696768a6c

          SHA1

          f9bbd145f630376dace8334b978d2c7ceff8d0ba

          SHA256

          56d8d64ebeadc71e9890d7a904808e8649425ca444019a89709bab4b751e2fd2

          SHA512

          bf0a8399a01a465f0687807f40650d368d557433d8eff5c5313f11fd904e977a68c0b802d09502c420ad329f7b436d9fd723f70d320d56a83ff242a6cf436844

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4962fe2d8d52e1196dcd40402913e73c

          SHA1

          496c284930f2d7d2b30aef461474c436f7f5a2cf

          SHA256

          eb3dd86d2910482f21f558a5105fa780846d2f7285e121689e6330c3de8b4170

          SHA512

          4f7ce0d75cf44e33962f6decdce415b66dc04b5d436fe65993769bc696067d3cba559a5c7f68365b194f6874c6465d0e12c86bf9fb7ff7533dd52bd307c33d34

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          814ff99c65ef938b3783d5d38db5a108

          SHA1

          4bdbadfd0faf840a7ef97171e5a68f8e34827fc2

          SHA256

          cdf7cf57e409d550d32073e9141320dcab243a495852a4846cadbbc38bfaedf5

          SHA512

          d69f0a72007060ed1ff1429918fd8db083ec7df12799f42e5aba7e9b085216dacf358587490bc7117de92cad959ba6667a13920613dbd9901a7f1fdd870db95c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8eccc045ab201b27a92e7d3350b64c5a

          SHA1

          716c707c20916584f060261e891cf615f7388a4f

          SHA256

          2405949693a86ee227bc3ca558f837b903154678f22b20a5b2c19cb4d23da5c6

          SHA512

          ee951469d039437fadc38585ed85c5806b21a36a97acfab1032043117e19c458ac4d9c08074a5dc99bcef3a55f25afedab737d0bc985fd5a5c429ba77b6c481d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a6716003ec3a46fef8fa32b76eaf3a90

          SHA1

          cce37dbb0eb4020e83afb39506704018090b5803

          SHA256

          34376c0a358c41f55d5b5c739de145224b958bb404498a261a100f2b4942dc93

          SHA512

          63e1fd2aeed67b07c314d299dd18ce6bb0db0cb071a125617840a593d2b4798b0f734340cf0756a703f979261c446e1c9c25cee2838b9463eecf7be44be9ac71

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          95066eb94febcf52a150ecc9246a8ccd

          SHA1

          9dfa15f1bc98403cded7d398cc83dc070a1db7b5

          SHA256

          b0c4de0772df94276a60e8460bb5dec72b7285205e98d4301b1e825c414dbb19

          SHA512

          350d2d2c85cdb0a827168d0bff8887baf6e417752133ccc0e9b319f47751f401400c26b2df92f899f9a4f6434121a9fb67c930f9a62d65583cba39f5b68b4aaa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4a44ca1f8d60323168c04e2e7697cf39

          SHA1

          9a44030edd24d13d64dde31417adaa281685fc49

          SHA256

          4cc95cbf4b0a77cf01bc238d2d177cb4a796284848fa35b9ce318ddfaa1ebfbb

          SHA512

          2617d262966cd5604913b242c3948406ed6e401d15e8764fb9c33f495bfd9943f86df984488ab022cfc10389478761504c26cc54fd05b2f103f99939f5391897

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8ecb3a12c446b23af979b2b6f5b06281

          SHA1

          2290c85c466bca89611400020dac189f3c3bcc90

          SHA256

          13d1eb0e6dfc16111c599c0af73e32c8d8b2e119ab2171c2f8714dba1601411a

          SHA512

          c9c96548b773010fd9f7dcc888e0682b987949cffe1c1913e0ee2f1236420fef4261d6b6182b7be46c16e373859be53abd05910ddfc0b4fb4807cbb028e39359

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          20b6266711152c1595191e94c5a6cfde

          SHA1

          2a8bf5d7975628e48cd0497955ea9cc93e746980

          SHA256

          92ba364542bc0fecbf7e48d7f43e0f11886bdda5d4fa2bb90a546a97af51add6

          SHA512

          a7892b80033343d3c6a86378f80a0d4aba0cbe1a5487b06ee620ac803d0e34bea2ee27cd13ee028ac1486f0bb8a61fea0377e85c0dfd44942f7617e57459ca2c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ea4d20b4b3922327bc412b2af39ef1a9

          SHA1

          bd2b537c6f9f263cc6c19108fa13d3cdb7017469

          SHA256

          8b543ab8fe1c8442a4cab6cacaeb707c5c205bd06c3fe2b7636ff0b7ea6e1d07

          SHA512

          e67bd549fea295604c68d61fdb00e871c93ac3ab4eff7788ec0dcd5cd82e4ec11a8f4fb654ec93a703728ce9d4e99c7f7923777a7938ff447ed58efd82c9fd93

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6e7b1390d5cab95a943b6bb88c0a8234

          SHA1

          a21bc16ef67688ed0d49dab2d0518dfa123a7e95

          SHA256

          6f86e86827d562e0b510e59cfa330876a79a2e7ffab59a1b66ae99d7c7ef3b82

          SHA512

          9883e9f9749111a0072df5c784c77596e247616fd28cc6a73f305a4ce4c684b7e94046279b6c1cf2934abea0f2b01dc5c38188777c0cb139d4bd6d95b0fd867f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d8b5b8d2a30c0650a667ab5395162e6b

          SHA1

          b0f7deef77eb8d4de90d96eb0ebfb7c3f9ae37bc

          SHA256

          daafb21fb5fd18479810ec9726a553389f898dea80b251cfb61b5eb5faeed8b3

          SHA512

          85f9643a6be6e8f35f82d37e1b914fd687427b7c57b7428de05f46de55232f28ea37178b594e89686166c370a3177d45be95169275b18a8ee1295f753f5e4de0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9a8c9da1b3cb7fef02d2b4eb2985f780

          SHA1

          63f4fa6ace6cba7840bcc067f6854e5038577748

          SHA256

          f02a3617281ee39471a1fbf2153f783b5b4cb8e684143a37f808d326ba367136

          SHA512

          256c02d76535db826c531250214589a7f191ac11ac902494d54ddcfa07a7f6a21e860f8688a074e308c151f35f05b5b6a3aac9086ab434ea27cabf9c6e77907e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ac532bf0026d4020100223f76ccddeef

          SHA1

          35b0ac3c7ab34c7724f7531c2c6b4995edcb3079

          SHA256

          7a4ba120e231d26ff0e961c359b992118b2049d0ec6a52d351a81fa6e4da759b

          SHA512

          17ea73d3df7b89444b60f0d636d5354bcc2ed4f01ce5d35d30deccaa09e4537f1d13ae429485db9f3e7ebeb783cfd075319f3f5c2b4a2d15403dd8d9f2ca340f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          53c1d9948389339ca4fdd097f92dd81e

          SHA1

          8938e55d10af6e65e30fb305975641e541262ca0

          SHA256

          5a3ff21e61739c21a7694692642aec11ac24004db55b7d2c997ab83c5cd70bcc

          SHA512

          6ee9ea570e4af3dff9966c7793a1820314420311636d1a800742c2b316e3fbd0cbd2dc1b872e5d6d5859236a8ceee5b94fc1197c00335ce2aea5e9bf0c62c8e9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a572a27b44e70e077210c0582b8ef208

          SHA1

          87420c11e72f8c644209ab3ed9c2d7dedce903fd

          SHA256

          544bd88ae66524509ea3442b8d0b8b7a2033581135d065d50ed225c0162669f3

          SHA512

          fcc428f575be20201762f8aa2977aedb67d2ce3165baf55347334c212c8bcc6993be3b07e440ff4a69a00578b4fe5b66cdef52c58e3bd7d154b8b7930fb05b02

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1b96fd0e9641c20850b5b8523f3acf9a

          SHA1

          83a071d67479eb45381ceddfe7247f2b07e141ab

          SHA256

          d621be8a971bc251e53c40d86459651f5742542bc5acd9129aa813a3cb664376

          SHA512

          822ee1555f41c34104617c32a329ddd2b6f3f5bf0c721d8bf1bc63cb044cc5c2cedd6bba7f5408ae29b360ae0883332dc56afbfae48801df901341a2741851d8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          aa438a2f3805254445ebc3c317eac122

          SHA1

          07f8f2cef1b3c64d2b6f8b113d3fbc910d3b0a26

          SHA256

          5b7a4ff3ab4917511644993fc538e023b365db03329771372fbeb4fc420fe56c

          SHA512

          f101421abe39aec332c8aa24521849331dc96f67e18ecf127e8ede6e06814090bce42f8116bac39ef66515d02bfea6652c588fecf005323482d73a4d0715b90d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9d038497486001023260b5236ab39177

          SHA1

          8df02c41a38ac93e28f859a03fa971e4b1870ae2

          SHA256

          620c9c21a669fe11149a38c72ca10db39dc2600b839fc81751a4f1ca14d60ebe

          SHA512

          fb471f1b4c46636fb689c8aeb1e53fdc665ea4e2c93b047e92e80ccee8d145a18a9ea6e8e8e1f0e141af89a4428403d0da19e42fffc31cc44dd3f8804ae4241e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          48ef78da88b189b8f5c12c56b6985f95

          SHA1

          c4dbbf3dd7805879502969de604951a8d05d4255

          SHA256

          3e7f5c4eff3e46dfe2b9a8c6e38fdb4a6088591df2a88a355780d12c7a95b289

          SHA512

          a499116b0727c47b7226135ccca971a0124bbb179da232ecefbab094f70a6a8a9789911251872bedbfe35c8f1aa99cea503dd8c812401a51cec0417a40f88105

        • C:\Users\Admin\AppData\Local\Temp\CONFIG.XML

          Filesize

          814B

          MD5

          1c23034114128a31faeec3ee523b7a09

          SHA1

          257b9e028437dae4b20c5b29078028f3373fb477

          SHA256

          fa4bf594f522537d98748e828eddee139b848bda0e81e32d931d1738b67817b8

          SHA512

          24b77fa2080ae6720715de2492cba3d9cb481f9357b507726955a9fd994d29d4e6a6cb5bad29ee4ff402eb1c6bccd8325739ef1244ea071222c25d1c9d3937b5

        • C:\Users\Admin\AppData\Local\Temp\Cab23AA.tmp

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Cab2429.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar245C.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • memory/1600-2-0x0000000074A80000-0x000000007502B000-memory.dmp

          Filesize

          5.7MB

        • memory/1600-22-0x0000000074A80000-0x000000007502B000-memory.dmp

          Filesize

          5.7MB

        • memory/1600-0-0x0000000074A81000-0x0000000074A82000-memory.dmp

          Filesize

          4KB

        • memory/1600-1-0x0000000074A80000-0x000000007502B000-memory.dmp

          Filesize

          5.7MB

        • memory/2752-6-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-25-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-17-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2752-9-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-501-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-502-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-503-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-504-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-505-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-507-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-4-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-13-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-12-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-11-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-16-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-24-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-10-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-19-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-20-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-18-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-8-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-988-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-989-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-990-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-991-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-992-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-993-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-994-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2752-995-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB