Malware Analysis Report

2025-04-13 23:12

Sample ID 240722-x4433stend
Target 647c163377ea98293d5310c5d25ac617_JaffaCakes118
SHA256 d50819e1d99e2bcca9c72e2483887f3b1d01ccf37f22bc578279e442fa906fc9
Tags
upx darkcomet rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d50819e1d99e2bcca9c72e2483887f3b1d01ccf37f22bc578279e442fa906fc9

Threat Level: Known bad

The file 647c163377ea98293d5310c5d25ac617_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

upx darkcomet rat trojan

Darkcomet

UPX packed file

Unsigned PE

Program crash

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-07-22 19:25

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-22 19:25

Reported

2024-07-22 19:53

Platform

win7-20240704-en

Max time kernel

121s

Max time network

127s

Command Line

"C:\Users\Admin\AppData\Local\Temp\647c163377ea98293d5310c5d25ac617_JaffaCakes118.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\647c163377ea98293d5310c5d25ac617_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\647c163377ea98293d5310c5d25ac617_JaffaCakes118.exe"

Network

N/A

Files

memory/2316-0-0x0000000013140000-0x0000000013289000-memory.dmp

C:\ProgramData\jI82l\PCGWIN32.LI5

MD5 e117ce23a858006b3b5c996b054214a0
SHA1 a1d0a604a92862c8eee821c9f55230ff73ba5903
SHA256 b05c47c145fb4c17995d59907a5b2b6d3a36f74f0af41023097f8c251c83d5f1
SHA512 a3503ac24c3b5aca6dc873863ef6a4f73f55ca2ea78e99be3c1b437e5eceb3cd19e1ae29e21ab446266baf2da1fc3ac2fb0ebac88fe8d51b294dd5abc074ce15

C:\ProgramData\jI82l\PCGWIN32.LI5

MD5 276f7a5072579fe83028a428e4f6df8d
SHA1 bccd0c1fa9c783028da772095cd543762775ee6c
SHA256 6a92876aed2246d1a50274238748a73164d68f743a44053316d2ab067ef634f9
SHA512 7e738324218bdacc79f4b97e1d99f222f6507349b66808f36930f1dd23b551443425816671eb6fb28a0f21347c01534cf119fbd364168ff3fc40b033997b507f

memory/2316-42-0x0000000013140000-0x0000000013289000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-22 19:25

Reported

2024-07-22 19:54

Platform

win10v2004-20240709-en

Max time kernel

94s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\647c163377ea98293d5310c5d25ac617_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\647c163377ea98293d5310c5d25ac617_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\647c163377ea98293d5310c5d25ac617_JaffaCakes118.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2124 -ip 2124

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 772

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 147.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

memory/2124-0-0x0000000013140000-0x0000000013289000-memory.dmp

C:\ProgramData\jI82l\PCGWIN32.LI5

MD5 010d4096b38fe582c4d675253b8c83fe
SHA1 9a6e6708ad8d426fe3f46d86240f60653899f260
SHA256 a3af244941fd1624cff12bb7ad8706b19b71b49d164398da50011b1ce3a869dd
SHA512 ac926d0aed3a4fea1425083d78df08e3e99bb8480c0cb2a17c5da8f395ea566e53788a50951608db92c1951b7b8a0ba82aaf847aa170a1dd2d14c6e9f61d2f9b

C:\ProgramData\jI82l\PCGWIN32.LI5

MD5 dfdde0e928843e42641c065b2c620c3f
SHA1 c9a4a93196919c30fa8d1e46e72b066825bcd52f
SHA256 1c62aef43f0d3230ee14b91f2e3c82567d80083cfad620a0e5fed826b82164ea
SHA512 7082752c7fa696456bbd093ba1a7238e3e5f7ba5a89036e1b105cc4d1660ab846f7c4cdce6e037e794ded3b83c5fa28dd3151ff9be3e529c60089efea4b63dde

memory/2124-42-0x0000000013140000-0x0000000013289000-memory.dmp