Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 22:38

General

  • Target

    b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe

  • Size

    416KB

  • MD5

    b11f04b1796fe2b24a5428960e3ee26e

  • SHA1

    d160c0ec90b7c02a4339da428616c65b2c5a91ba

  • SHA256

    5d12d8c7d715e980111ec339f59ca8f8c34adec411d53fd3531be9819d5b3251

  • SHA512

    b48eeb0676c8e7ecd6dd2b21ececf4b3936ecd445248e33203942c704c1fe24fdfb18f95bd01ab89d1e753a187217a439e77d4e090fd6d471acc16025d0efd48

  • SSDEEP

    12288:+HuaNL06AzT4OlWNDQ1YRVtWl8YKPHMWVoS:+Oa4s60AY/tWlbKPHM

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b11f04b1796fe2b24a5428960e3ee26e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\Wqodj.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "csrss" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\csrss.exe" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2260
    • C:\Users\Admin\AppData\Roaming\csrss.exe
      "C:\Users\Admin\AppData\Roaming\csrss.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Users\Admin\AppData\Roaming\csrss.exe
        "C:\Users\Admin\AppData\Roaming\csrss.exe"
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:1284

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Wqodj.bat

          Filesize

          130B

          MD5

          2e20f9e88c23d1a2516870cda3aedf54

          SHA1

          144d9248bc22e76c3e8bdeafd5ae548a8f103ff7

          SHA256

          e7cfb8c2b4f259b2336b9e10f3090cf0373ddc35dc78aea148aefd2668d96884

          SHA512

          68d2455d6fcc5e1d1efb9c141286b28f2f2b352f5d4e2f86c463d5c5064cdb4a64a971de1cc2cc90e6be11457d5dab527185e55715267e96eaf05928b4c80bd4

        • C:\Users\Admin\AppData\Roaming\csrss.exe

          Filesize

          416KB

          MD5

          b11f04b1796fe2b24a5428960e3ee26e

          SHA1

          d160c0ec90b7c02a4339da428616c65b2c5a91ba

          SHA256

          5d12d8c7d715e980111ec339f59ca8f8c34adec411d53fd3531be9819d5b3251

          SHA512

          b48eeb0676c8e7ecd6dd2b21ececf4b3936ecd445248e33203942c704c1fe24fdfb18f95bd01ab89d1e753a187217a439e77d4e090fd6d471acc16025d0efd48

        • memory/1284-60-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/1284-71-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/1284-68-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/1284-66-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/1284-64-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/1284-62-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/1284-55-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/1284-57-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/1284-47-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/1284-48-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/1284-56-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/1284-52-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/1284-51-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/1284-53-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/1284-54-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/2292-42-0x0000000000400000-0x0000000000911000-memory.dmp

          Filesize

          5.1MB

        • memory/2292-37-0x0000000003C70000-0x0000000004181000-memory.dmp

          Filesize

          5.1MB

        • memory/2292-38-0x0000000003C70000-0x0000000004181000-memory.dmp

          Filesize

          5.1MB

        • memory/2292-0-0x0000000000400000-0x0000000000911000-memory.dmp

          Filesize

          5.1MB

        • memory/2292-35-0x0000000003C70000-0x0000000004181000-memory.dmp

          Filesize

          5.1MB

        • memory/2292-36-0x0000000003C70000-0x0000000004181000-memory.dmp

          Filesize

          5.1MB

        • memory/2292-34-0x0000000003C70000-0x0000000004181000-memory.dmp

          Filesize

          5.1MB

        • memory/2568-50-0x0000000000400000-0x0000000000911000-memory.dmp

          Filesize

          5.1MB

        • memory/2568-40-0x0000000000400000-0x0000000000911000-memory.dmp

          Filesize

          5.1MB