Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 07:37

General

  • Target

    3e985bdc5f361dd3888e297a16954ef7_JaffaCakes118.exe

  • Size

    743KB

  • MD5

    3e985bdc5f361dd3888e297a16954ef7

  • SHA1

    155fc36725ba673639801b010bd08c0f1e8be20b

  • SHA256

    7c87cdb90f0d491daae2eccd5086369be8c6bedf0a64949fbdef56b9b669e952

  • SHA512

    fd47445e80bd395309092642a69a1e39b32c3a07adf197276061732a87d3e8482984454620a82f32c87cf2438afcff955030c7decb657b7364bcce22f364b7d5

  • SSDEEP

    12288:pb6irgErd6tBwz0b4EQboJoMzv2Q5nWQBiroq40oDqV77nu3PbQoh:p+Mh0M0cUJpeQrAsmV77uTQi

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e985bdc5f361dd3888e297a16954ef7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3e985bdc5f361dd3888e297a16954ef7_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Users\Admin\AppData\Local\Temp\3e985bdc5f361dd3888e297a16954ef7_JaffaCakes118.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1692-2-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/1692-3-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/1692-4-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/1692-5-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/1692-6-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/1692-7-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/1692-8-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/1692-9-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/1692-11-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB