Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2024, 19:28

General

  • Target

    689d3b376444629b2db7f4f4bbf194b0_JaffaCakes118.exe

  • Size

    601KB

  • MD5

    689d3b376444629b2db7f4f4bbf194b0

  • SHA1

    89361e65979066937b7d24720ac8e5a107cfc60e

  • SHA256

    57e57b8eefd5a9f717396871df8bb5572ec6b94ab0985a551c838414317bebda

  • SHA512

    94831e1a8625c8c11ff30a68870ddea0a71dcfbf1667939b12f6432ec0dfd66a609a51dd5008e15a381bc4632bb6940ed85abdcea48e505b5f78cb20ba8c9c61

  • SSDEEP

    12288:v6Wq4aaE6KwyF5L0Y2D1PqL2OlxFzU+RaO0kxDRu0h1nGiJdZttE37U6I:tthEVaPqL2OlXPfLNhPGgdleI

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

Mutex

DC_MUTEX-F54S21D

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    HAC9L4KeLiZp

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\689d3b376444629b2db7f4f4bbf194b0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\689d3b376444629b2db7f4f4bbf194b0_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      C:\Users\Admin\AppData\Local\Temp/server.exe
      2⤵
      • Modifies WinLogon for persistence
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\server.exe" +s +h
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:220
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp\server.exe" +s +h
          4⤵
          • Sets file to hidden
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1668
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4484
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
          4⤵
          • Sets file to hidden
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:3152
      • C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe
        "C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"
        3⤵
        • Modifies firewall policy service
        • Modifies security service
        • Windows security bypass
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:3468
        • C:\Windows\SysWOW64\notepad.exe
          notepad
          4⤵
          • System Location Discovery: System Language Discovery
          PID:640

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\server.exe

          Filesize

          350KB

          MD5

          703726645e1058094b2abe2f9035594d

          SHA1

          4aa275e9e07f109bce29372587d68102bc050655

          SHA256

          22715fa9b5938490bf9dc60ee6d75c4e058447b884d619be2e40f7abf8e22777

          SHA512

          6629e678b63be102d545174a8b9fa5aed98380e9edbd39fd0ca328044462bb971842d395bfcb504508a2cfba19438f2df8acb279f8864443e502d3e40ca2910a

        • memory/640-74-0x0000000000980000-0x0000000000981000-memory.dmp

          Filesize

          4KB

        • memory/2176-9-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/2176-11-0x0000000000AE0000-0x0000000000AE1000-memory.dmp

          Filesize

          4KB

        • memory/2176-73-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/2244-0-0x0000000000400000-0x00000000004C2000-memory.dmp

          Filesize

          776KB

        • memory/2244-10-0x0000000000400000-0x00000000004C2000-memory.dmp

          Filesize

          776KB

        • memory/3468-76-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/3468-75-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/3468-77-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/3468-79-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/3468-80-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/3468-81-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/3468-82-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/3468-83-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/3468-84-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/3468-88-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB