Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 13:41

General

  • Target

    5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe

  • Size

    527KB

  • MD5

    5c2db70f99be448c7ce5eef4004e3b99

  • SHA1

    4fa84d05e3d0764357795ebd5b74a5386a92752f

  • SHA256

    7a097c0d98ef1eb154add34a8641bda4d9cec751c722cb1af1fae9aaef71cc78

  • SHA512

    2f2123020258d28c6b83c32584e26ae505c40fb5b47121c5dd2cc22813b92d84bd7aa7dcc5d9df56fc6928d00e77adc977b1ebe9718968c1f6af7ba1c3d99b7f

  • SSDEEP

    12288:Q9jXIMlSia8JyH8d3zScOC9Y/OiaWVVJL0GGCXNc/5:UjRNauycd3zSA19+Q+u5

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

Mutex

DC_MUTEX-0SR134T

Attributes
  • gencode

    8QPKGQajuMgz

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2208-5-0x0000000076EB1000-0x0000000076EB2000-memory.dmp

    Filesize

    4KB

  • memory/2208-4-0x00000000773D0000-0x00000000773D1000-memory.dmp

    Filesize

    4KB

  • memory/2208-3-0x0000000001DF0000-0x0000000001E00000-memory.dmp

    Filesize

    64KB

  • memory/2208-2-0x0000000001E30000-0x0000000001E40000-memory.dmp

    Filesize

    64KB

  • memory/2208-0-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2208-1-0x0000000000280000-0x00000000002CD000-memory.dmp

    Filesize

    308KB

  • memory/2208-6-0x0000000076EA0000-0x0000000076FB0000-memory.dmp

    Filesize

    1.1MB

  • memory/2208-7-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2208-8-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2208-9-0x0000000000280000-0x00000000002CD000-memory.dmp

    Filesize

    308KB

  • memory/2208-10-0x0000000001E30000-0x0000000001E40000-memory.dmp

    Filesize

    64KB

  • memory/2208-11-0x0000000001DF0000-0x0000000001E00000-memory.dmp

    Filesize

    64KB

  • memory/2208-14-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB