Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 15:32

General

  • Target

    22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe

  • Size

    629KB

  • MD5

    22dc5d62c2c40824901f2a5517e8029c

  • SHA1

    4141e70636c8b08e4a5ec8cc9520065a73090d37

  • SHA256

    123632b9babaa3e3f16e508c26e2a60f33c5edf896a9146819f83508250157fb

  • SHA512

    77358ab753c43964bff84448f218854a01aea3cefd77288e1fa2b89ba79f0084726ec47a64703df9600c5ba7f5c5f67b4f40d6e58f8739e8fd47ef802da683a4

  • SSDEEP

    12288:lew0ZLatzDCneocNspaFpmqdbX/hUb+XjRikc0ijv/tNC:sLZGtzDCndc6QFpmqRX/GbEe0ipI

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:90

Mutex

DC_MUTEX-F54S21D

Attributes
  • gencode

    kpDRvFaHMVJE

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1972
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\N86ZG7VO.JPG

    Filesize

    12KB

    MD5

    d51da87dd1d685c086ad25bb83fd4962

    SHA1

    10e4f3ac00b1fd67ab5fd7028c12ca1b397bd94c

    SHA256

    1db7db80595bd8b1642396f41ed660e46dd6b787ac2015cc4827999fc4a31446

    SHA512

    2e5700976136928066301dbce9bb57d620fad0ed4c019c59f7b0315881a55baee99a2aa0797add3fd7a31bd54642250e3feffdc4a447f97bacbc75e4505895e2

  • memory/1972-6-0x0000000074DD0000-0x0000000074EE0000-memory.dmp

    Filesize

    1.1MB

  • memory/1972-12-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/1972-5-0x0000000074DE1000-0x0000000074DE2000-memory.dmp

    Filesize

    4KB

  • memory/1972-4-0x00000000772C0000-0x00000000772C1000-memory.dmp

    Filesize

    4KB

  • memory/1972-3-0x0000000000610000-0x0000000000620000-memory.dmp

    Filesize

    64KB

  • memory/1972-0-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1972-8-0x0000000002610000-0x0000000002612000-memory.dmp

    Filesize

    8KB

  • memory/1972-15-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/1972-14-0x0000000000610000-0x0000000000620000-memory.dmp

    Filesize

    64KB

  • memory/1972-2-0x0000000000270000-0x00000000002BE000-memory.dmp

    Filesize

    312KB

  • memory/1972-1-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/1972-13-0x0000000000270000-0x00000000002BE000-memory.dmp

    Filesize

    312KB

  • memory/2904-10-0x0000000074DD0000-0x0000000074EE0000-memory.dmp

    Filesize

    1.1MB

  • memory/2904-9-0x00000000001F0000-0x00000000001F2000-memory.dmp

    Filesize

    8KB