Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/10/2024, 15:29

General

  • Target

    2240015dde576cf8210ad19f14375b0a_JaffaCakes118.exe

  • Size

    944KB

  • MD5

    2240015dde576cf8210ad19f14375b0a

  • SHA1

    fa3ca047d959bc4b2d5d168e8d42ab5b8ce1f488

  • SHA256

    abb98e50ee3ea6fa853b4ce61adec75a059b459e9f2abbed9e5ce9569eddd918

  • SHA512

    fb52f23857fdcfc1e4fd65c31d038d06acbdc1d88e0b981710e61b294dd2614263cdf8cb92efe8f8b6aeb148466ea9263545740311c3414ac918d468aa8a16dd

  • SSDEEP

    24576:hvFBOv034btz0MXsqafUaRzep+w/l/T9lEv4:Nk1GqAha/Av

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2240015dde576cf8210ad19f14375b0a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2240015dde576cf8210ad19f14375b0a_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Users\Admin\AppData\Local\Temp\win95.exe
      C:\Users\Admin\AppData\Local\Temp\win95.exe
      2⤵
      • Checks BIOS information in registry
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\win95.exe

    Filesize

    7KB

    MD5

    d79efb472a22ad75d501317b21e66b5e

    SHA1

    24512f54884d3dda2d803457bbd3dcd513356196

    SHA256

    7255b1d1f001b9d9a5177e1f8063bcc824effe3570e6c19508babe12bb73c7d6

    SHA512

    7c5a2f516a727ddeb05f9a7c6565375debb05709ac9b95212fc748cba37a2ab81b7d727636141096e4511679ce140b07b37fdf36cfb47d8d1c8accdd24163ae5

  • memory/1476-19-0x0000000075370000-0x0000000075921000-memory.dmp

    Filesize

    5.7MB

  • memory/1476-1-0x0000000075370000-0x0000000075921000-memory.dmp

    Filesize

    5.7MB

  • memory/1476-2-0x0000000075370000-0x0000000075921000-memory.dmp

    Filesize

    5.7MB

  • memory/1476-0-0x0000000075372000-0x0000000075373000-memory.dmp

    Filesize

    4KB

  • memory/4324-20-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-22-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-10-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-13-0x0000000002770000-0x0000000002771000-memory.dmp

    Filesize

    4KB

  • memory/4324-14-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-18-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-16-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-17-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-8-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-5-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-21-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-11-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-23-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-24-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-25-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-26-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-27-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-28-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-29-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-30-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-31-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-32-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/4324-33-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB