Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-06-2024 21:48

General

  • Target

    17a6cf62409d259d281c82ae00259d66_JaffaCakes118.exe

  • Size

    700KB

  • MD5

    17a6cf62409d259d281c82ae00259d66

  • SHA1

    15c2bccc3f8bc41190eaa6b49da6c99eccf1602d

  • SHA256

    1ccaafea3b64fe2c5e7859d550ade584d93e7bdc28472317022693456c6f2c64

  • SHA512

    2d0e56b9117b7dd0f6f1910dad82b09f9e1d693d238422498c93c3d14e6de7ebdef4bd0decfc20582305b1ed41db98ff4bd447da72181dc97e6aa8601fd6110b

  • SSDEEP

    12288:/yPPQ1ufEoYFwm4jFySBXY3sHuss0dtyxvlrKnnmRjVLPrJHbFJ8:/yPPMpoY6HXY3Kusfexv4n6jVLxc

Malware Config

Extracted

Family

darkcomet

Botnet

åååååååååå

C2

ogdd.servemp3.com:4433

Mutex

DC_MUTEX-LGYC4QH

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    7UYk2EHbmDiQ

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17a6cf62409d259d281c82ae00259d66_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\17a6cf62409d259d281c82ae00259d66_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1352
    • C:\Users\Admin\AppData\Local\Temp\17a6cf62409d259d281c82ae00259d66_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\17a6cf62409d259d281c82ae00259d66_JaffaCakes118.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Drops file in Drivers directory
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
        "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3296
        • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
          "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:5000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

    Filesize

    700KB

    MD5

    17a6cf62409d259d281c82ae00259d66

    SHA1

    15c2bccc3f8bc41190eaa6b49da6c99eccf1602d

    SHA256

    1ccaafea3b64fe2c5e7859d550ade584d93e7bdc28472317022693456c6f2c64

    SHA512

    2d0e56b9117b7dd0f6f1910dad82b09f9e1d693d238422498c93c3d14e6de7ebdef4bd0decfc20582305b1ed41db98ff4bd447da72181dc97e6aa8601fd6110b

  • memory/1352-13-0x0000000002950000-0x0000000002960000-memory.dmp

    Filesize

    64KB

  • memory/1352-0-0x00000000004C0000-0x00000000004D0000-memory.dmp

    Filesize

    64KB

  • memory/1352-17-0x00000000029A0000-0x00000000029B0000-memory.dmp

    Filesize

    64KB

  • memory/1352-15-0x0000000002970000-0x0000000002980000-memory.dmp

    Filesize

    64KB

  • memory/1352-12-0x0000000002940000-0x0000000002950000-memory.dmp

    Filesize

    64KB

  • memory/1352-14-0x0000000002960000-0x0000000002970000-memory.dmp

    Filesize

    64KB

  • memory/1352-11-0x00000000020E0000-0x00000000020F0000-memory.dmp

    Filesize

    64KB

  • memory/1352-10-0x00000000020D0000-0x00000000020E0000-memory.dmp

    Filesize

    64KB

  • memory/1352-9-0x00000000020C0000-0x00000000020D0000-memory.dmp

    Filesize

    64KB

  • memory/1352-8-0x00000000020B0000-0x00000000020C0000-memory.dmp

    Filesize

    64KB

  • memory/1352-7-0x00000000020A0000-0x00000000020B0000-memory.dmp

    Filesize

    64KB

  • memory/1352-16-0x0000000002980000-0x0000000002990000-memory.dmp

    Filesize

    64KB

  • memory/1352-6-0x0000000002090000-0x00000000020A0000-memory.dmp

    Filesize

    64KB

  • memory/1352-1-0x0000000002040000-0x0000000002050000-memory.dmp

    Filesize

    64KB

  • memory/1352-2-0x0000000002050000-0x0000000002060000-memory.dmp

    Filesize

    64KB

  • memory/1352-3-0x0000000002060000-0x0000000002070000-memory.dmp

    Filesize

    64KB

  • memory/1352-5-0x0000000002080000-0x0000000002090000-memory.dmp

    Filesize

    64KB

  • memory/1352-4-0x0000000002070000-0x0000000002080000-memory.dmp

    Filesize

    64KB

  • memory/1760-24-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1760-20-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1760-22-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1760-21-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1760-23-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1760-68-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/3296-54-0x0000000002020000-0x0000000002030000-memory.dmp

    Filesize

    64KB

  • memory/3296-42-0x00000000005D0000-0x00000000005E0000-memory.dmp

    Filesize

    64KB

  • memory/3296-39-0x00000000005A0000-0x00000000005B0000-memory.dmp

    Filesize

    64KB

  • memory/3296-41-0x00000000005C0000-0x00000000005D0000-memory.dmp

    Filesize

    64KB

  • memory/3296-50-0x0000000001FD0000-0x0000000001FE0000-memory.dmp

    Filesize

    64KB

  • memory/3296-43-0x00000000005E0000-0x00000000005F0000-memory.dmp

    Filesize

    64KB

  • memory/3296-53-0x0000000002000000-0x0000000002010000-memory.dmp

    Filesize

    64KB

  • memory/3296-49-0x0000000001FC0000-0x0000000001FD0000-memory.dmp

    Filesize

    64KB

  • memory/3296-48-0x0000000001FB0000-0x0000000001FC0000-memory.dmp

    Filesize

    64KB

  • memory/3296-47-0x0000000001FA0000-0x0000000001FB0000-memory.dmp

    Filesize

    64KB

  • memory/3296-52-0x0000000001FF0000-0x0000000002000000-memory.dmp

    Filesize

    64KB

  • memory/3296-56-0x0000000002040000-0x0000000002050000-memory.dmp

    Filesize

    64KB

  • memory/3296-55-0x0000000002030000-0x0000000002040000-memory.dmp

    Filesize

    64KB

  • memory/3296-51-0x0000000001FE0000-0x0000000001FF0000-memory.dmp

    Filesize

    64KB

  • memory/3296-45-0x0000000001F80000-0x0000000001F90000-memory.dmp

    Filesize

    64KB

  • memory/3296-40-0x00000000005B0000-0x00000000005C0000-memory.dmp

    Filesize

    64KB

  • memory/3296-46-0x0000000001F90000-0x0000000001FA0000-memory.dmp

    Filesize

    64KB

  • memory/3296-44-0x0000000001F70000-0x0000000001F80000-memory.dmp

    Filesize

    64KB

  • memory/5000-67-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-74-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-66-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-65-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-64-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-70-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-71-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-72-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-73-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-63-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-75-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-76-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-77-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-78-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-79-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-80-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-81-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-82-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-83-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/5000-84-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB