Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/10/2024, 18:42

General

  • Target

    23a2f651f393bfcb0232d33c2b2f87a4_JaffaCakes118.exe

  • Size

    731KB

  • MD5

    23a2f651f393bfcb0232d33c2b2f87a4

  • SHA1

    e3787ca1dceb0910a26525e6828f16112d7f58fa

  • SHA256

    d9dd37d60ebed8ec37f180ff4c026f04f76f84280aaad865da886b21544019f5

  • SHA512

    8c8f25783573da53c61c692159b7645855b623fdba0f82d00c487d6e2f893b4b4ef940661168a452459d10e5bf8889dae552ec069d5b3ce23543466b841972d9

  • SSDEEP

    12288:Ro6QZKN8RMELcXfMOBw+NF+9cIdTAN/9x/rsIMNoUMCOvCCSFFzBm//AAyX71aIt:WbjRmXUOod6V+IMNbOvvSbB4/cZ

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23a2f651f393bfcb0232d33c2b2f87a4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\23a2f651f393bfcb0232d33c2b2f87a4_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:460
    • C:\Users\Admin\AppData\Local\Temp\23a2f651f393bfcb0232d33c2b2f87a4_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\23a2f651f393bfcb0232d33c2b2f87a4_JaffaCakes118.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Checks BIOS information in registry
      • Checks computer location settings
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Windows\SysWOW64\notepad.exe
        notepad
        3⤵
          PID:2828
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 76
            4⤵
            • Program crash
            PID:3404
        • C:\Windows\SysWOW64\explorer.exe
          "C:\Windows\SysWOW64\explorer.exe"
          3⤵
            PID:4660
          • C:\Windupdt\winupdate.exe
            "C:\Windupdt\winupdate.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1524
            • C:\Windupdt\winupdate.exe
              "C:\Windupdt\winupdate.exe"
              4⤵
              • Modifies firewall policy service
              • Modifies security service
              • Windows security bypass
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Windows security modification
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Enumerates system info in registry
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1856
              • C:\Windows\SysWOW64\notepad.exe
                C:\Windows\SysWOW64\notepad.exe
                5⤵
                • System Location Discovery: System Language Discovery
                PID:2680
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2828 -ip 2828
        1⤵
          PID:3564

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windupdt\winupdate.exe

          Filesize

          731KB

          MD5

          23a2f651f393bfcb0232d33c2b2f87a4

          SHA1

          e3787ca1dceb0910a26525e6828f16112d7f58fa

          SHA256

          d9dd37d60ebed8ec37f180ff4c026f04f76f84280aaad865da886b21544019f5

          SHA512

          8c8f25783573da53c61c692159b7645855b623fdba0f82d00c487d6e2f893b4b4ef940661168a452459d10e5bf8889dae552ec069d5b3ce23543466b841972d9

        • memory/460-6-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/460-0-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/1376-7-0x0000000013140000-0x00000000131FE000-memory.dmp

          Filesize

          760KB

        • memory/1376-8-0x0000000013140000-0x00000000131FE000-memory.dmp

          Filesize

          760KB

        • memory/1376-9-0x0000000002790000-0x0000000002791000-memory.dmp

          Filesize

          4KB

        • memory/1376-4-0x0000000013140000-0x00000000131FE000-memory.dmp

          Filesize

          760KB

        • memory/1376-3-0x0000000013140000-0x00000000131FE000-memory.dmp

          Filesize

          760KB

        • memory/1376-72-0x0000000013140000-0x00000000131FE000-memory.dmp

          Filesize

          760KB

        • memory/1524-80-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/1856-81-0x0000000013140000-0x00000000131FE000-memory.dmp

          Filesize

          760KB

        • memory/1856-77-0x0000000013140000-0x00000000131FE000-memory.dmp

          Filesize

          760KB

        • memory/1856-78-0x0000000013140000-0x00000000131FE000-memory.dmp

          Filesize

          760KB

        • memory/1856-84-0x0000000013140000-0x00000000131FE000-memory.dmp

          Filesize

          760KB

        • memory/1856-85-0x0000000013140000-0x00000000131FE000-memory.dmp

          Filesize

          760KB

        • memory/1856-83-0x0000000013140000-0x00000000131FE000-memory.dmp

          Filesize

          760KB

        • memory/1856-87-0x0000000013140000-0x00000000131FE000-memory.dmp

          Filesize

          760KB

        • memory/2680-82-0x00000000004F0000-0x00000000004F1000-memory.dmp

          Filesize

          4KB

        • memory/2828-11-0x0000000000B00000-0x0000000000B01000-memory.dmp

          Filesize

          4KB