Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-08-2024 19:40

General

  • Target

    8765a5e1f007f0063ab6d1f55a986fe8_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    8765a5e1f007f0063ab6d1f55a986fe8

  • SHA1

    0df249f5c7d9e6bb91c73a8fd7651d186571b97c

  • SHA256

    df11a1c9b0f856c56cde814e93905525b87b81ad089fee0e5f8ac685fd582fba

  • SHA512

    4eb5ca1663b452f80062df5a5f91630d3c7def41c334118d1b4a4862ad642fb3d7960f56b32082ff5fbff2b78a9fbc11961b949c4f1e765a144fa4f959658038

  • SSDEEP

    24576:6MKL7S6ZU6+7oiXkgPDBfvWuljngt1ZNmPDPe9NrR2Df8oasV7qwMpELbQIplqVT:6pL7SVRciXFteuljuZMPavrRytaIqzuR

Malware Config

Extracted

Family

darkcomet

Botnet

aaaa608

C2

handsomehearteng.zapto.org:1608

Mutex

DC_MUTEX-WPKUFHB

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    nlbQUbAhW2Ce

  • install

    true

  • offline_keylogger

    false

  • password

    123456

  • persistence

    false

  • reg_key

    MicroUpdate

Extracted

Family

latentbot

C2

handsomehearteng.zapto.org

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 52 IoCs
  • Suspicious use of FindShellTrayWindow 40 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8765a5e1f007f0063ab6d1f55a986fe8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8765a5e1f007f0063ab6d1f55a986fe8_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3668
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\SEX PORN CELEBRITY HOT FIRST TIME FUCKED - COPY.WMV"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:3652
    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MSDCSC\msdcsc.exe
      "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MSDCSC\msdcsc.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2800
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x49c 0x4a0
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MSDCSC\msdcsc.exe

    Filesize

    1.5MB

    MD5

    8765a5e1f007f0063ab6d1f55a986fe8

    SHA1

    0df249f5c7d9e6bb91c73a8fd7651d186571b97c

    SHA256

    df11a1c9b0f856c56cde814e93905525b87b81ad089fee0e5f8ac685fd582fba

    SHA512

    4eb5ca1663b452f80062df5a5f91630d3c7def41c334118d1b4a4862ad642fb3d7960f56b32082ff5fbff2b78a9fbc11961b949c4f1e765a144fa4f959658038

  • C:\Users\Admin\AppData\Local\Temp\SEX PORN CELEBRITY HOT FIRST TIME FUCKED - COPY.WMV

    Filesize

    1.3MB

    MD5

    e0229f0e0829ed76033bcaeca02ba3d2

    SHA1

    bcd9e8835c82bdf1eccd56f142d169f1a3c5130d

    SHA256

    890b236da6eea440d080f11ee575f633b6deeccb6845b7ec5f45460638162118

    SHA512

    26036b39ab1f3bc267e092823f1941155f47391ef7dab7e1e419f4ac0706b8c4482b687c974032abb3e543ade5dcf9519b9ccddc4b13e141640d865094d2f8d5

  • memory/2800-30-0x0000000000400000-0x000000000061B000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-81-0x0000000000400000-0x000000000061B000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-58-0x0000000000400000-0x000000000061B000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-25-0x0000000000400000-0x000000000061B000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-29-0x0000000000400000-0x000000000061B000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-24-0x0000000000400000-0x000000000061B000-memory.dmp

    Filesize

    2.1MB

  • memory/2800-27-0x0000000000400000-0x000000000061B000-memory.dmp

    Filesize

    2.1MB

  • memory/3652-44-0x00007FFD17310000-0x00007FFD1732D000-memory.dmp

    Filesize

    116KB

  • memory/3652-38-0x00007FFD077B0000-0x00007FFD07A66000-memory.dmp

    Filesize

    2.7MB

  • memory/3652-70-0x00007FFD06300000-0x00007FFD073B0000-memory.dmp

    Filesize

    16.7MB

  • memory/3652-48-0x00007FFD16AE0000-0x00007FFD16B21000-memory.dmp

    Filesize

    260KB

  • memory/3652-49-0x00007FFD16AB0000-0x00007FFD16AD1000-memory.dmp

    Filesize

    132KB

  • memory/3652-37-0x00007FFD178D0000-0x00007FFD17904000-memory.dmp

    Filesize

    208KB

  • memory/3652-36-0x00007FF749960000-0x00007FF749A58000-memory.dmp

    Filesize

    992KB

  • memory/3652-42-0x00007FFD173D0000-0x00007FFD173E7000-memory.dmp

    Filesize

    92KB

  • memory/3652-45-0x00007FFD172F0000-0x00007FFD17301000-memory.dmp

    Filesize

    68KB

  • memory/3652-50-0x00007FFD16A90000-0x00007FFD16AA8000-memory.dmp

    Filesize

    96KB

  • memory/3652-43-0x00007FFD17330000-0x00007FFD17341000-memory.dmp

    Filesize

    68KB

  • memory/3652-41-0x00007FFD1BCA0000-0x00007FFD1BCB1000-memory.dmp

    Filesize

    68KB

  • memory/3652-40-0x00007FFD1C760000-0x00007FFD1C777000-memory.dmp

    Filesize

    92KB

  • memory/3652-46-0x00007FFD073B0000-0x00007FFD075BB000-memory.dmp

    Filesize

    2.0MB

  • memory/3652-39-0x00007FFD1CDB0000-0x00007FFD1CDC8000-memory.dmp

    Filesize

    96KB

  • memory/3652-47-0x00007FFD06300000-0x00007FFD073B0000-memory.dmp

    Filesize

    16.7MB

  • memory/3652-56-0x00007FFD060E0000-0x00007FFD060F2000-memory.dmp

    Filesize

    72KB

  • memory/3652-54-0x00007FFD06120000-0x00007FFD06135000-memory.dmp

    Filesize

    84KB

  • memory/3652-53-0x00007FFD11F50000-0x00007FFD11F61000-memory.dmp

    Filesize

    68KB

  • memory/3652-55-0x00007FFD06100000-0x00007FFD06111000-memory.dmp

    Filesize

    68KB

  • memory/3652-57-0x00007FFD02840000-0x00007FFD029BA000-memory.dmp

    Filesize

    1.5MB

  • memory/3652-52-0x00007FFD16A50000-0x00007FFD16A61000-memory.dmp

    Filesize

    68KB

  • memory/3652-51-0x00007FFD16A70000-0x00007FFD16A81000-memory.dmp

    Filesize

    68KB

  • memory/3668-3-0x0000000000400000-0x000000000061B000-memory.dmp

    Filesize

    2.1MB

  • memory/3668-28-0x0000000000400000-0x000000000061B000-memory.dmp

    Filesize

    2.1MB

  • memory/3668-0-0x0000000000400000-0x000000000061B000-memory.dmp

    Filesize

    2.1MB

  • memory/3668-4-0x0000000000400000-0x000000000061B000-memory.dmp

    Filesize

    2.1MB

  • memory/3668-2-0x0000000000400000-0x000000000061B000-memory.dmp

    Filesize

    2.1MB

  • memory/3668-1-0x0000000000400000-0x000000000061B000-memory.dmp

    Filesize

    2.1MB

  • memory/3668-5-0x00000000023E0000-0x00000000023E1000-memory.dmp

    Filesize

    4KB