Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 07:23

General

  • Target

    bad3375c1afb85e12eaa4f872e640c58_JaffaCakes118.exe

  • Size

    758KB

  • MD5

    bad3375c1afb85e12eaa4f872e640c58

  • SHA1

    d279596e7fbc990d2ee51649aa2e4f79bcd51bf1

  • SHA256

    828bf06da890c926bcfec850972e98ef358b5def95ca47da2c0ab931a6202aab

  • SHA512

    ff7c03887def0abf56aca3a814020e8a699fef48b02e5844a1ec7d2c63db847578cf2017cb86f4a5aa19c75e76710f1d0c850c6ffe26b715f90116d463720631

  • SSDEEP

    12288:I3GnbxJJobfq8zKx2p3c9n9X4Lj/Ajiam4KLPzdRnSR5MmB:I21roDz26c9n9oHDC

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bad3375c1afb85e12eaa4f872e640c58_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bad3375c1afb85e12eaa4f872e640c58_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\bad3375c1afb85e12eaa4f872e640c58_JaffaCakes118.exe
      2⤵
      • Modifies WinLogon for persistence
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1460
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2068
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 600
        3⤵
        • Program crash
        PID:2424

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat

          Filesize

          101B

          MD5

          e50fa0c662353c4807d34884118f53c0

          SHA1

          a0fccaef131230a5508b7897e2b9f9b2282082b6

          SHA256

          9580f44f273791752589d29d5e1f73ca6ec0d00653984725f0ffd42d3aeb46a1

          SHA512

          6488fb4f407ba87630cb6cfeab1c315d1c454e378e1e7b068c77da314bba1eea5701733cc810bfef5f8e396f200bcf07c3c9a1a8fcfbdcc402d8ad2fdb43606d

        • memory/1460-12-0x0000000000400000-0x00000000004C7000-memory.dmp

          Filesize

          796KB

        • memory/1460-22-0x0000000000400000-0x00000000004C7000-memory.dmp

          Filesize

          796KB

        • memory/1460-20-0x0000000000400000-0x00000000004C7000-memory.dmp

          Filesize

          796KB

        • memory/1460-21-0x0000000000400000-0x00000000004C7000-memory.dmp

          Filesize

          796KB

        • memory/1460-18-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1460-16-0x0000000000400000-0x00000000004C7000-memory.dmp

          Filesize

          796KB

        • memory/1460-10-0x0000000000400000-0x00000000004C7000-memory.dmp

          Filesize

          796KB

        • memory/1460-8-0x0000000000400000-0x00000000004C7000-memory.dmp

          Filesize

          796KB

        • memory/1460-14-0x0000000000400000-0x00000000004C7000-memory.dmp

          Filesize

          796KB

        • memory/1460-6-0x0000000000400000-0x00000000004C7000-memory.dmp

          Filesize

          796KB

        • memory/1460-2-0x0000000000400000-0x00000000004C7000-memory.dmp

          Filesize

          796KB

        • memory/1460-23-0x0000000000400000-0x00000000004C7000-memory.dmp

          Filesize

          796KB

        • memory/1460-24-0x0000000000400000-0x00000000004C7000-memory.dmp

          Filesize

          796KB

        • memory/1460-4-0x0000000000400000-0x00000000004C7000-memory.dmp

          Filesize

          796KB

        • memory/1460-37-0x0000000000400000-0x00000000004C7000-memory.dmp

          Filesize

          796KB