Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2024, 13:28

General

  • Target

    3508ff82502de9dfc9411320c9133193_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    3508ff82502de9dfc9411320c9133193

  • SHA1

    1e971e49f734090a21090841c91eaede3fba9d3c

  • SHA256

    d608318f464ebe6b10160e69f2fd175f3183d9150b96c4326a17f7a18e2d967f

  • SHA512

    2b6e21fbc1621720b4419e8ad3f14bc6612f723c8b9cfa0c73b01f2c7b4486ec553f9fecccc764d054d977f55a6170e00aa375fb1dac3273fa7dec378048c14f

  • SSDEEP

    24576:riXCCCI2GRuVNXkZBFTG9+8PO2+GxCPMRB:ril7RusXFTm+8J

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3508ff82502de9dfc9411320c9133193_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3508ff82502de9dfc9411320c9133193_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      C:\Users\Admin\AppData\Roaming\svchost.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    1KB

    MD5

    3a59a4a04feeabfdc9c0e3cb4f0127fb

    SHA1

    c797b6208d6f0db0e07cf4c94f5904ca45648661

    SHA256

    89e8caef7c451837923a0363d8a7b6994f9cbfc9c9515800dcec2c5ea2ff4d48

    SHA512

    f7762ef018f8cdbfbd7e7efacc9e324bd90ef3422565f1dbbe1288e7e5d750d3268e663f19bcf14ac8b64e166bcbd0b74ba49f26960bf20fb22ec4777ab63510

  • memory/1456-22-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-32-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-36-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-11-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-23-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-35-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-15-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-16-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-17-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-20-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-19-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-18-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-34-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-21-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-13-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-24-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-25-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-26-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-27-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-28-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-29-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-30-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-31-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1456-33-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/2692-0-0x0000000074251000-0x0000000074252000-memory.dmp

    Filesize

    4KB

  • memory/2692-2-0x0000000074250000-0x00000000747FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2692-14-0x0000000074250000-0x00000000747FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2692-1-0x0000000074250000-0x00000000747FB000-memory.dmp

    Filesize

    5.7MB