Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13-08-2024 13:30

General

  • Target

    934848d0db1061bcedac028bbdf3fcff_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    934848d0db1061bcedac028bbdf3fcff

  • SHA1

    7eae11e0aaa6a2bfefb37537c1f7df28f8043149

  • SHA256

    2ed7d9a7249ca29a607da1c1e2a91cb75f9e9c9c19a8f34fa02d15fdd565af06

  • SHA512

    6f4275d3828b40ce6629d4cbcf36ab44c953c91a131375cb591008fbde7840125366ccbd248738f1aa6ed31618f4ff45dc758d11a9564bb8cb611086ba58d853

  • SSDEEP

    24576:8Tv8IaE4o4xKc4dl/AjR5ZbfDWItOtqAK2MB/lAdizMzBIqjwoljui:Kv8I3pWF4D4HZv/4in/SizM7F

Malware Config

Extracted

Family

darkcomet

Botnet

sexy_dah

C2

dc.jong.li:1604

Mutex

DCMIN_MUTEX-7Q30C88

Attributes
  • InstallPath

    ANZ\DCR.exe

  • gencode

    oM0WgwgmE3HS

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DCR

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 4 IoCs
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 19 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\934848d0db1061bcedac028bbdf3fcff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\934848d0db1061bcedac028bbdf3fcff_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\register.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\register.exe
        3⤵
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\register.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\register.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2252
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\register.exe
            /scomma "C:\Users\Admin\AppData\Local\Temp\64HnSowMS1.ini"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\setup.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\setup.exe
        3⤵
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\setup.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\setup.exe
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2848
          • C:\Users\Admin\AppData\Roaming\ANZ\DCR.exe
            "C:\Users\Admin\AppData\Roaming\ANZ\DCR.exe"
            5⤵
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2152
            • C:\Users\Admin\AppData\Roaming\ANZ\DCR.exe
              C:\Users\Admin\AppData\Roaming\ANZ\DCR.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1960
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\INSTAL~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\INSTAL~1.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1840
      • C:\Users\Admin\AppData\Local\Temp\INSTAL~1.exe
        "C:\Users\Admin\AppData\Local\Temp\INSTAL~1.exe" {RemoveFile:C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\INSTAL~1.EXE}
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious use of SetWindowsHookEx
        PID:1836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\62B5AF9BE9ADC1085C3C56EC07A82BF6

    Filesize

    80KB

    MD5

    fd8dc0d175accbcfbd8e8e3fe98b7d29

    SHA1

    b60d545bbe675fd46fd1493c01c2f5e48b0186de

    SHA256

    92030a2fe9c738415b32ae12a7d9e9773c32fb337c9daf8fe0469dc9c66f04c6

    SHA512

    fa7a4e9fde9a86af0cd0e5c76864f534add2ac2b5c3773e96417716ce04a2718755df47990037dcafe6dc79c6f0973158341decd26e587b282aea0ea11e7ae54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B8944BA8AD0EFDF0E01A43EF62BECD0_4069BD6CA0A97DCB6D4110B1A16AB213

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    834B

    MD5

    a0af4d81b2b19a99a3d01be89d5f99d9

    SHA1

    4725c1a810005f860ede9dace7f1e5a20e5230d6

    SHA256

    de9f05ceb1610cf9964f0def09d525005569602993c82a647743f192e9414d4a

    SHA512

    eb98d475d51d07b929d92fe5aa00bfa21078f567906f3650eb3bebfff39c616a21918da8f0687853310acebdb160d4f65451204619a7b8085fbbc25491bb0554

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\62B5AF9BE9ADC1085C3C56EC07A82BF6

    Filesize

    212B

    MD5

    8d2877888d119ac706cd2eb969ad5758

    SHA1

    f3c5d3c4b931d10847fd3ca2e32224cf96b24a00

    SHA256

    ab6718a4a95fea359ecef51578bb1dacbbb280c17cb36b4ceca8a5ca9adbbbd0

    SHA512

    c23bcf45fa0426ff71b74187ce033f5d38ad59fe24515eb250aafa9da713922f11b820eac94b62ca7ddc8c1ca27b8263ae8693145c34127f31d6af02935b7c5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B8944BA8AD0EFDF0E01A43EF62BECD0_4069BD6CA0A97DCB6D4110B1A16AB213

    Filesize

    404B

    MD5

    bff559645d572e7e19ac4cf3ccd5c1a1

    SHA1

    35da2455a5f967895d80efe80690e5325a406dca

    SHA256

    469f9dc59971dc11eb216e2ca001bb9329c9d5fabda2f4ffc5ba07152d8790ed

    SHA512

    24fbb3b50c92167c299dfd200edd0169a265ec053d62513b156be3868dee477345193bce49d70d8922a0d70a73c24aa4f03aa62f7a19f70c3124fe0f8a12d94a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6

    Filesize

    404B

    MD5

    ff90182ab0ef3b5d4c1aac6fab6b56a8

    SHA1

    0e182d8609065cac319a52e78e035c0621833e44

    SHA256

    1c32958723f93c7c9a1d8e08d7748538351378ade7e4eb2e65384381f15350de

    SHA512

    1485f996680fb64c1f8f2f914f0d75b14eed749ed23406bf638e658899c588a3c6e03b6ecc673d02faa15873e7c0587e2d608c20b41dc2b53dd5c0f9d288d627

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F

    Filesize

    188B

    MD5

    e5d63cc8296ec3470309be47297a3748

    SHA1

    413062242be8fef18aec36ae34796e666b0f1acb

    SHA256

    b20f233b5b16599a88671e128f1d9c72f47ba0eedc1dd3ff3da44e6282698b1d

    SHA512

    6c97b413f8aa0d88cecf4a4995184459072a168c83b36986225c85608d0adc977444c169dd82d63a1f6b82ff86d35632d63f8a16cc712942fbb4d47332c3f6a0

  • C:\Users\Admin\AppData\Local\Temp\64HnSowMS1.ini

    Filesize

    5B

    MD5

    d1ea279fb5559c020a1b4137dc4de237

    SHA1

    db6f8988af46b56216a6f0daf95ab8c9bdb57400

    SHA256

    fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba

    SHA512

    720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3

  • C:\Users\Admin\AppData\Local\Temp\AIH.22968aaa05999987a2cc1ee119e79b07e47b5225\launcher.dll

    Filesize

    159KB

    MD5

    58203fda53992567be20e42ba89e6720

    SHA1

    aabbe580ebcfe456097c453f170b2d4a3fb68738

    SHA256

    e545488e13a5c37c3e636c331c6757679c720582e8b62b381e95e8225b48277b

    SHA512

    b91a6c8d85900737fd7910aac3ed707fa417a0770f78ac6e3cc0fa3c5f1384d4dbccb3ae0475f57c00b60cc46506347195ac22af3ca454d897225d174544ef48

  • C:\Users\Admin\AppData\Local\Temp\Cab1065.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar14AC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\AIH.22968aaa05999987a2cc1ee119e79b07e47b5225\downloader.bundle

    Filesize

    298KB

    MD5

    14bbe2088b97b023c0535c35fed78520

    SHA1

    47fbc699c005f0c8ffa37f5fb440611a5d3c0661

    SHA256

    0172906a741253c224582a094c22395fed05c5667b90da4b75283f12630755c3

    SHA512

    7b820ac1a6dcd72d6cd7c894d56fbb14402ffc63eb7a5e2995736a675bca42d0ce6ad59a85be21833ea4418426cca43e47158224cb0ef0f6ffad0d1a2c5b4b09

  • \Users\Admin\AppData\Local\Temp\AIH.22968aaa05999987a2cc1ee119e79b07e47b5225\downloader.dll

    Filesize

    494KB

    MD5

    7a2ec9f7a677f1ff12a9555d29706802

    SHA1

    98e98ed99c594b9a6dc41a865f4e4bf89ff26fde

    SHA256

    6bcd57825059c61324067eaf1585793474747089052aa63a2bf37dd1189f4334

    SHA512

    a87aa2c4f98ee663da00bbba57764e591ef0c508d54d579831b3d2adf7340cce51008a80abac82d8b6c80b3fcb1af4ffe806dcaabd4bb60e106074763c4b3f9a

  • \Users\Admin\AppData\Local\Temp\AIH.22968aaa05999987a2cc1ee119e79b07e47b5225\launcher.bundle

    Filesize

    102KB

    MD5

    ce4fa42fc6b827f445326efaae3300d1

    SHA1

    9f81511731e1dd1ac66a26ce8a4e2bc45fb8c099

    SHA256

    780a401cbde358a58c8a24aeef0e40bf0262b7bd6b2a5c9ce52cde2c69ab45fa

    SHA512

    3cf75cd99a9e5671f751c0cc81042f135b9f119f89710d9266fc35f148b1283128047537469bac1354647208e81c5da15defc2731d46f6e440fac6e594ccab29

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\INSTAL~1.EXE

    Filesize

    777KB

    MD5

    a61eb98cfd655c2241639b9a00e89d35

    SHA1

    16ed8b3ae464c17f8538da40ab40b1071d29b7f8

    SHA256

    9a53363897b57224ba7d2b3e120d517f6943e4877fb36eb95fe012c766285c2e

    SHA512

    b46f92de331673bd25679b801e6459b2b9380a62d177174305bfa4afa18829ef9d9250749dc95c8cb40c6b0a71beade7cb18437030372d7e3bcae405fc2f9f12

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe

    Filesize

    1011KB

    MD5

    5de573deb7bda9c2809f3aadc477754a

    SHA1

    9bec057a1784ed111d9088c15a80a79dfeb73d36

    SHA256

    fd3492b64c3a36d9dba2e6547df9978906bd3a6fc7757e636312b598bee2e9bc

    SHA512

    02f84d8fc659a34d9541e504154fcc861a64cc880722bc99d59508aa2d051d118a1bf2ba839cd3f2addbcc68bc0ef0ae95b1fdb7423e94de47038b25d0928400

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\register.exe

    Filesize

    292KB

    MD5

    d2dda4e2bc7c908eca70cef2b4fe8536

    SHA1

    079ceeae56d4e8e3d50d25e95be4b2b121580746

    SHA256

    8c98384c3fc340bfcd6b5660f871618024293f168a75a729a8fef13ccf660a92

    SHA512

    94cd0d15860624b7d2c37d63fd9959ad86578809c7c2aba25f03ff9d215ee3ffb350deae737cf0e6f640b1bbc235d156ddfc427312f6f7e436855dcd700fe5b2

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\setup.exe

    Filesize

    744KB

    MD5

    9953ae7cc3e1304182196ccf5210c6b3

    SHA1

    2280da98414d206e67cfda878565a94460cd1cbc

    SHA256

    cc38f0be7593dc1081da6cee2b4a855b3611691bc82d2c17acc89b5eb1a212ca

    SHA512

    2ed676c97e2eac66aba42faa6f6182c924704fccb22f5f47bd898fa930291611c1c6548497e34e57019de3c66393c65168d880b87dc5f5aef2a8de7d79966fb8

  • memory/1836-141-0x00000000001D0000-0x0000000000248000-memory.dmp

    Filesize

    480KB

  • memory/1836-388-0x00000000001D0000-0x0000000000248000-memory.dmp

    Filesize

    480KB

  • memory/1840-121-0x00000000008A0000-0x0000000000918000-memory.dmp

    Filesize

    480KB

  • memory/1840-140-0x0000000002810000-0x0000000002888000-memory.dmp

    Filesize

    480KB

  • memory/1840-139-0x00000000008A0000-0x0000000000918000-memory.dmp

    Filesize

    480KB

  • memory/1960-118-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/1960-119-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/1960-120-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/1960-387-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2096-80-0x0000000000220000-0x0000000000298000-memory.dmp

    Filesize

    480KB

  • memory/2252-21-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2252-394-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2252-19-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2252-27-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2252-25-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2252-23-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2252-90-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2848-59-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2848-56-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2848-65-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2848-68-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2848-66-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2848-49-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2848-76-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2848-51-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2848-53-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2848-63-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2848-57-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2848-61-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2864-34-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2864-37-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2864-39-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2864-38-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2864-47-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB