Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2024 13:48

General

  • Target

    e04ff8e2f5428eb348ef15d2bff2d773_JaffaCakes118.exe

  • Size

    713KB

  • MD5

    e04ff8e2f5428eb348ef15d2bff2d773

  • SHA1

    dfce6756d38767402779417316d013d57d1737a5

  • SHA256

    a3f83a5dbbb7cf5fa3c6e02941ab958a8d9dfa782a86cfc5bad1e27111878e47

  • SHA512

    76ade40922052104c6decd78a3dcffba55030b23bafe07c205e17fd4fc9b3dd1295c3deaa1b784e363a3df36bb65cd3a52692fb246c33776491cb0b132b5189c

  • SSDEEP

    12288:+47XhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy45p:+GnAw2WWeFcfbP9VPSPMTSPL/rWvzq4R

Malware Config

Extracted

Family

darkcomet

Botnet

Stuff

C2

idunnolol123.zapto.org:4023

Mutex

DC_MUTEX-WJ8NW3C

Attributes
  • gencode

    bUmX0FvpA1CS

  • install

    false

  • offline_keylogger

    true

  • password

    lolp1ss

  • persistence

    false

Extracted

Family

latentbot

C2

idunnolol123.zapto.org

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e04ff8e2f5428eb348ef15d2bff2d773_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e04ff8e2f5428eb348ef15d2bff2d773_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\VANESSA.EXE
      "C:\Users\Admin\AppData\Local\Temp\VANESSA.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\VANESSA.EXE

    Filesize

    660KB

    MD5

    73fea1d03c504ba31fc0a88426356f11

    SHA1

    1bafae6dfde55917f7a857b5938dc45f4a9f98e8

    SHA256

    dddb6907af339e7d2eabf818f3d29b94884871029a72d790c12e7cd07da30f1f

    SHA512

    36e1e3654538a73d5a05c69d2687068c30622739f10aa8dc35f96cd97141231483e6f6a9b40b3f8de0cf768029a3468629180ab285760715d82049dd7cd02e76

  • memory/2296-9-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2296-10-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2296-12-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2296-15-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2296-16-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2296-19-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB