Analysis

  • max time kernel
    143s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2024, 01:03

General

  • Target

    0d37824cb0dc10df2966d847302e3134_JaffaCakes118.exe

  • Size

    12.3MB

  • MD5

    0d37824cb0dc10df2966d847302e3134

  • SHA1

    e163829ff705fb291800039cd76329c4d5d89787

  • SHA256

    f325a078aaa41aaf0c5f619dd2b6d9d1e4fb9837cc54aa2ab71c88aae95580db

  • SHA512

    81be17af1314fa34e5154e3e12ee53cf50c23b6fa8054656b181a570da0212f1696aa24d85bbce06d2d48a57e6fffc7d512bf28d5b2a7e74bb2c76859fff38c5

  • SSDEEP

    393216:JEgHFEEvurJSPUObk/q40p+iZKdwmJRXe08AxWouRlRSDxl49:CIFEEvurJSPUObk/q40p+iZkwmJRX981

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

activatedmasric.no-ip.info:4899

Mutex

DC_MUTEX-61V7TCV

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    9HHCTuEUFRd0

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d37824cb0dc10df2966d847302e3134_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0d37824cb0dc10df2966d847302e3134_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Users\Admin\AppData\Local\Temp\vbc.exe
      C:\Users\Admin\AppData\Local\Temp\vbc.exe
      2⤵
      • Modifies WinLogon for persistence
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3368
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\MAMATA WALKS OUT OF SHOW, CALLS STUDENTS MAOISTS - YOUTUBE.MP4"
        3⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:2628
      • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
        "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:936
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4d4 0x510
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4736

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\MAMATA WALKS OUT OF SHOW, CALLS STUDENTS MAOISTS - YOUTUBE.MP4

          Filesize

          7.1MB

          MD5

          17c8b58c288efb141ce02b16f8d497a9

          SHA1

          88f683db816b531e635c5c7751ceea57fab9a33a

          SHA256

          02cda387961af9a7e28d06f6974508763a64b33dfcecdfb4b84743493feacee8

          SHA512

          1ea849facbf1e4169ad221407124da8a45da7a658dfdbd51377bddd0592ac5adb712015434af58fa8d0b9c12d0afde953a7ae29d609936e59221a1e404e4c12b

        • C:\Users\Admin\AppData\Local\Temp\vbc.exe

          Filesize

          1.1MB

          MD5

          d881de17aa8f2e2c08cbb7b265f928f9

          SHA1

          08936aebc87decf0af6e8eada191062b5e65ac2a

          SHA256

          b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

          SHA512

          5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

        • memory/2628-46-0x00007FFC20290000-0x00007FFC202A7000-memory.dmp

          Filesize

          92KB

        • memory/2628-58-0x00007FFC1B3D0000-0x00007FFC1B3E1000-memory.dmp

          Filesize

          68KB

        • memory/2628-53-0x00007FFC0F3D0000-0x00007FFC10480000-memory.dmp

          Filesize

          16.7MB

        • memory/2628-54-0x00007FFC1F960000-0x00007FFC1F9A1000-memory.dmp

          Filesize

          260KB

        • memory/2628-52-0x00007FFC10480000-0x00007FFC1068B000-memory.dmp

          Filesize

          2.0MB

        • memory/2628-55-0x00007FFC1EE50000-0x00007FFC1EE71000-memory.dmp

          Filesize

          132KB

        • memory/2628-56-0x00007FFC1FB20000-0x00007FFC1FB38000-memory.dmp

          Filesize

          96KB

        • memory/2628-51-0x00007FFC1FB40000-0x00007FFC1FB51000-memory.dmp

          Filesize

          68KB

        • memory/2628-50-0x00007FFC1FB60000-0x00007FFC1FB7D000-memory.dmp

          Filesize

          116KB

        • memory/2628-47-0x00007FFC200F0000-0x00007FFC20101000-memory.dmp

          Filesize

          68KB

        • memory/2628-42-0x00007FF79A730000-0x00007FF79A828000-memory.dmp

          Filesize

          992KB

        • memory/2628-43-0x00007FFC203D0000-0x00007FFC20404000-memory.dmp

          Filesize

          208KB

        • memory/2628-59-0x00007FFC1AA40000-0x00007FFC1AA51000-memory.dmp

          Filesize

          68KB

        • memory/2628-57-0x00007FFC1B3F0000-0x00007FFC1B401000-memory.dmp

          Filesize

          68KB

        • memory/2628-45-0x00007FFC202B0000-0x00007FFC202C8000-memory.dmp

          Filesize

          96KB

        • memory/2628-49-0x00007FFC20070000-0x00007FFC20081000-memory.dmp

          Filesize

          68KB

        • memory/2628-44-0x00007FFC10B80000-0x00007FFC10E36000-memory.dmp

          Filesize

          2.7MB

        • memory/2628-48-0x00007FFC200D0000-0x00007FFC200E7000-memory.dmp

          Filesize

          92KB

        • memory/3368-16-0x0000000002B40000-0x0000000002B41000-memory.dmp

          Filesize

          4KB

        • memory/3368-14-0x0000000000400000-0x0000000000BD3000-memory.dmp

          Filesize

          7.8MB

        • memory/3368-7-0x0000000000400000-0x0000000000BD3000-memory.dmp

          Filesize

          7.8MB

        • memory/3368-40-0x0000000000400000-0x0000000000BD3000-memory.dmp

          Filesize

          7.8MB

        • memory/3368-12-0x0000000000400000-0x0000000000BD3000-memory.dmp

          Filesize

          7.8MB

        • memory/3368-10-0x0000000000400000-0x0000000000BD3000-memory.dmp

          Filesize

          7.8MB

        • memory/4052-0-0x00000000750A2000-0x00000000750A3000-memory.dmp

          Filesize

          4KB

        • memory/4052-1-0x00000000750A0000-0x0000000075651000-memory.dmp

          Filesize

          5.7MB

        • memory/4052-15-0x00000000750A0000-0x0000000075651000-memory.dmp

          Filesize

          5.7MB

        • memory/4052-2-0x00000000750A0000-0x0000000075651000-memory.dmp

          Filesize

          5.7MB