Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:45

General

  • Target

    eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe

  • Size

    2.9MB

  • MD5

    eac90624b777b28d1049dbb907d15a5f

  • SHA1

    1edfec839bd5dade13e637e37a4d9e434dcc6d62

  • SHA256

    4219e3fde43f1a64d937cf29a91cd2894986aea3dcaee98ec4fb2de9fabfd4e6

  • SHA512

    a04b731c7c23b794f3a2f4ed72dde9243c642548e6a82662833cfb7bcb9e5b208628babf1a7fba9448fb30fa67dde6a2393ebd6284858bd4f053ca9b44baa1cb

  • SSDEEP

    49152:tOenanS7qj2OfqfI6p6shtvT0JehzIybYdCPVvrYtCSV5dtKwjqUo6NXLlRR:2njj2OyAxsDLM8dDm5dPjjlRR

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 12 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 20 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4840
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
        PID:2904
      • C:\Windows\SysWOW64\Windupdt\winupdate.exe
        "C:\Windows\system32\Windupdt\winupdate.exe"
        2⤵
        • Modifies WinLogon for persistence
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Writes to the Master Boot Record (MBR)
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Windows\SysWOW64\explorer.exe
          "C:\Windows\SysWOW64\explorer.exe"
          3⤵
            PID:3148
          • C:\Windows\SysWOW64\Windupdt\winupdate.exe
            "C:\Windows\system32\Windupdt\winupdate.exe"
            3⤵
            • Modifies WinLogon for persistence
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Writes to the Master Boot Record (MBR)
            • Drops file in System32 directory
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Enumerates system info in registry
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4488
            • C:\Windows\SysWOW64\explorer.exe
              "C:\Windows\SysWOW64\explorer.exe"
              4⤵
                PID:2704
              • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                "C:\Windows\system32\Windupdt\winupdate.exe"
                4⤵
                • Modifies WinLogon for persistence
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Adds Run key to start application
                • Checks whether UAC is enabled
                • Writes to the Master Boot Record (MBR)
                • Drops file in System32 directory
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Enumerates system info in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2044
                • C:\Windows\SysWOW64\explorer.exe
                  "C:\Windows\SysWOW64\explorer.exe"
                  5⤵
                  • Checks BIOS information in registry
                  • Identifies Wine through registry keys
                  • Writes to the Master Boot Record (MBR)
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Checks processor information in registry
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of SetWindowsHookEx
                  PID:60

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Windupdt\winupdate.exe

          Filesize

          2.9MB

          MD5

          eac90624b777b28d1049dbb907d15a5f

          SHA1

          1edfec839bd5dade13e637e37a4d9e434dcc6d62

          SHA256

          4219e3fde43f1a64d937cf29a91cd2894986aea3dcaee98ec4fb2de9fabfd4e6

          SHA512

          a04b731c7c23b794f3a2f4ed72dde9243c642548e6a82662833cfb7bcb9e5b208628babf1a7fba9448fb30fa67dde6a2393ebd6284858bd4f053ca9b44baa1cb

        • memory/60-67-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-78-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-81-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-55-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-88-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-59-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-61-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-65-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-69-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-73-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-56-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-57-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-58-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-60-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-52-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-89-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-76-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-66-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-75-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-74-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-72-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-71-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-70-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-80-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-62-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-63-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-77-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-87-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-86-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-85-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-84-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-83-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-82-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-79-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-68-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/60-64-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/2044-54-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/2044-50-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/2888-41-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/2888-45-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/2888-42-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/2888-39-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/4488-49-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/4488-46-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/4840-4-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/4840-2-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/4840-1-0x0000000000401000-0x000000000044C000-memory.dmp

          Filesize

          300KB

        • memory/4840-0-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/4840-40-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB

        • memory/4840-5-0x0000000000400000-0x0000000000A08000-memory.dmp

          Filesize

          6.0MB