Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16/10/2024, 01:25

General

  • Target

    4ad1d7fecf5fe5f53d1089c05633ed2e_JaffaCakes118.exe

  • Size

    984KB

  • MD5

    4ad1d7fecf5fe5f53d1089c05633ed2e

  • SHA1

    5cbb0d0da628682454ac4e24fc9550f18cc95bd8

  • SHA256

    87f6ca66ff40533b63ed610e2e496a9c569be7414501cd2b8469db874692f984

  • SHA512

    6cf33f041b0a3201dcdd0a5baa7f32ed16d6792a0ed45836898f02c11763cfdae5ba6f8b228042f5e98f61c962353e2467074e72da599bed0ea36a721b2adb09

  • SSDEEP

    24576:LGr99O099e9X1y99999999999999999999999999999iSB8xopQfrbkcpOP0nNCQ:/6qWpQsH0kK1SYpOqHs8u9

Malware Config

Extracted

Family

darkcomet

Botnet

My Slaves

C2

lolyfgcycuxu.no-ip.biz:26789

Mutex

DC_MUTEX-J9KGRP9

Attributes
  • gencode

    isjk9gY2A5KA

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ad1d7fecf5fe5f53d1089c05633ed2e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4ad1d7fecf5fe5f53d1089c05633ed2e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Users\Admin\AppData\Local\Temp\4ad1d7fecf5fe5f53d1089c05633ed2e_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\4ad1d7fecf5fe5f53d1089c05633ed2e_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Users\Admin\AppData\Local\Temp\COPY OF INSTAGRAM AND TWITTER GAINER.EXE
        "C:\Users\Admin\AppData\Local\Temp\COPY OF INSTAGRAM AND TWITTER GAINER.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2776
      • C:\Users\Admin\AppData\Local\Temp\COPY OF INSTAGRAM FOLLOWERS.EXE
        "C:\Users\Admin\AppData\Local\Temp\COPY OF INSTAGRAM FOLLOWERS.EXE"
        3⤵
        • Modifies firewall policy service
        • Modifies security service
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\COPY OF INSTAGRAM FOLLOWERS.EXE" +s +h
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1252
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Users\Admin\AppData\Local\Temp\COPY OF INSTAGRAM FOLLOWERS.EXE" +s +h
            5⤵
            • Sets file to hidden
            • System Location Discovery: System Language Discovery
            • Views/modifies file attributes
            PID:2000
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:920
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
            5⤵
            • Sets file to hidden
            • System Location Discovery: System Language Discovery
            • Views/modifies file attributes
            PID:2672
        • C:\Windows\SysWOW64\notepad.exe
          notepad
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1624
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\KGzEl.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\COPY OF INSTAGRAM AND TWITTER GAINER.EXE

    Filesize

    24KB

    MD5

    34842dc59aa299425b9f125db179d5b6

    SHA1

    73dea64a659198801dc71580ce17408c1400a3eb

    SHA256

    580b44e49a4857a7eb74fb92080768621341b41dee26e9640cc34fa2e943c0a6

    SHA512

    4c9314a8eae22bb458d78114586981c5061406296e1199b5fa60b318339f1b63558223a2117a2fc319a2e0d3de2c8072d44e32757887292569497a45be196016

  • C:\Users\Admin\AppData\Local\Temp\COPY OF INSTAGRAM FOLLOWERS.EXE

    Filesize

    731KB

    MD5

    52dd6aad70b2935a100ce2ae2a30fd2d

    SHA1

    a5a0744d280db9bf959d9d46b538f37c89fac82b

    SHA256

    e9df7c14f8b68f2de7599e2bd88a2ebbff1f9b96292735523f219c9c4823a08d

    SHA512

    067ddd779efe582e69d37376319542c217b8f88dd3839e869dc9bcb47d065bbefea3ebb73827903285d62d6d878ca64ad78b514642888b604d3aff97de95b92c

  • C:\Users\Admin\AppData\Local\Temp\KGzEl.vbs

    Filesize

    408B

    MD5

    1dfca4a085536d0351398141ec4ad428

    SHA1

    8fb8cb61367c01807426c681633d77a086b6980f

    SHA256

    0be4987a21b264b8ff1f7b926d2204b9e4c6b85e76c311b9b2f923376207aa48

    SHA512

    5d52ac8355ac97f06860694e467f0b85c0a200d4bc84a50c2a808fbfcecbeda1f0b27af359ded52595ef630c3e4e2d813ce03e6327633d7316fdff8e1dc4d91a

  • memory/1624-88-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/1624-50-0x00000000000C0000-0x00000000000C1000-memory.dmp

    Filesize

    4KB

  • memory/2344-13-0x0000000000400000-0x00000000004E1000-memory.dmp

    Filesize

    900KB

  • memory/2344-22-0x0000000000400000-0x00000000004E1000-memory.dmp

    Filesize

    900KB

  • memory/2344-15-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2344-44-0x0000000000400000-0x00000000004E1000-memory.dmp

    Filesize

    900KB

  • memory/2344-11-0x0000000000400000-0x00000000004E1000-memory.dmp

    Filesize

    900KB

  • memory/2344-9-0x0000000000400000-0x00000000004E1000-memory.dmp

    Filesize

    900KB

  • memory/2344-7-0x0000000000400000-0x00000000004E1000-memory.dmp

    Filesize

    900KB

  • memory/2344-5-0x0000000000400000-0x00000000004E1000-memory.dmp

    Filesize

    900KB

  • memory/2344-17-0x0000000000400000-0x00000000004E1000-memory.dmp

    Filesize

    900KB

  • memory/2344-20-0x0000000000400000-0x00000000004E1000-memory.dmp

    Filesize

    900KB

  • memory/2344-4-0x0000000000400000-0x00000000004E1000-memory.dmp

    Filesize

    900KB

  • memory/2460-37-0x00000000747C0000-0x0000000074D6B000-memory.dmp

    Filesize

    5.7MB

  • memory/2460-0-0x00000000747C1000-0x00000000747C2000-memory.dmp

    Filesize

    4KB

  • memory/2460-2-0x00000000747C0000-0x0000000074D6B000-memory.dmp

    Filesize

    5.7MB

  • memory/2460-1-0x00000000747C0000-0x0000000074D6B000-memory.dmp

    Filesize

    5.7MB

  • memory/2704-89-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2704-90-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2704-91-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2704-92-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2704-93-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2704-94-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2704-95-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2704-96-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB