Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    16-10-2024 15:32

General

  • Target

    4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe

  • Size

    840KB

  • MD5

    4d9cc610b320ba38be66f36c55a9a771

  • SHA1

    2f399ad060bdaeabd2bd62c87aaec35dfafcfec3

  • SHA256

    15656bffba0e2814b2c1ac576f7b8c5641ca19f640251b249983b72eafe51f5f

  • SHA512

    f85388ca9a7bea96fc4cac7cd26201c9970de7e98f9ccf464bc1c27eb65a45b541e9077826b13a9b274fb2ec8f4089c1c640686ae9cec549d5f39caf85352d97

  • SSDEEP

    12288:L////czfa1FLFhPI8woWYXnPlVql5ciJ4FCzB+ZqlV2UQQA8j:L////cba1FrPVw6RinBeKV2UQQA8j

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Disables Task Manager via registry modification
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4d9cc610b320ba38be66f36c55a9a771_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kero8l9m.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2588
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF44F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF44E.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2972
    • C:\Users\Admin\AppData\Local\Temp\FdcKJU.exe
      "C:\Users\Admin\AppData\Local\Temp\FdcKJU.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2864
    • C:\Users\Admin\AppData\Local\Temp\svchsot.exe
      C:\Users\Admin\AppData\Local\Temp\svchsot.exe
      2⤵
      • Modifies firewall policy service
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2964
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
          PID:2120

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\FdcKJU.exe

      Filesize

      4KB

      MD5

      e70e37a9a9fdb1029c8d5bcfb595fc29

      SHA1

      115076f4dcd592ebca07cf6df42e8a13a1f2c0f8

      SHA256

      af2d3d47b4673ec8d5e8322277b0c44fdb994bd87f8db4377bb8b814deaa650e

      SHA512

      257a6bc7f415867201c7c7609fba495935495276afe5607ee491feecdb9caca0867e24bbdca41d9b028671e5490c85c475e187e00f0f8d09fb5ee8878507e97f

    • C:\Users\Admin\AppData\Local\Temp\RESF44F.tmp

      Filesize

      1KB

      MD5

      d3dea9261f6785d2e4d0e186859f289f

      SHA1

      68daf80abedf60ad586aef0784975d613e2b50c3

      SHA256

      1db433029e57c6db717de41117a96e569e4ef2a23e7397fc5d437d2b92557be0

      SHA512

      01b1d1aadc0b04184489a694c15495aa27aeec1f9d77e8dc498724127691112e67c8897f3aac7a876ad46fbb5ed919899d6c4043f3401087c81b0247eecd283c

    • \??\c:\Users\Admin\AppData\Local\Temp\CSCF44E.tmp

      Filesize

      644B

      MD5

      2c9c27e24f3f0397b2524d174acf6446

      SHA1

      4fe4388d76fbb30f1861e8bd4f0314898e878c2b

      SHA256

      360319079e102fd47bc7e6f87189b11567524cb6501b41c16cae6acbcb6ca7b6

      SHA512

      e8bbde09e515a4f7ffedaaa840a99e0622e8ae90793f35700e450992cd63c7c65cce45d43b6330bd19910634f78b8510667748ca18489bb2d52c9b11647cbb00

    • \??\c:\Users\Admin\AppData\Local\Temp\kero8l9m.0.cs

      Filesize

      1KB

      MD5

      2213239e80e871f9ac49de583c363317

      SHA1

      488858c268a52e504b7eb08fa7ed32994b41c2c5

      SHA256

      5ae20ce7a86efecea947802d1098f7a958d0f02d0760dbd850fe8309c6487bc0

      SHA512

      1b4dd80972b0ba1edc406a494760d182b58c65dfaaa0036b1b8878a9efe49021bd5145bd0de4753256a4735825f8c2d80c071ff5230a181cfe91855e31610997

    • \??\c:\Users\Admin\AppData\Local\Temp\kero8l9m.cmdline

      Filesize

      259B

      MD5

      4badeca2ccd5d876c0f92d2e4248d099

      SHA1

      6b7584104e16bdfb2c78f2ea662b84ca3d73b172

      SHA256

      4efe9ab4812e33d255ad931f42579161b1780b772c6dbb8053d6463011f795bf

      SHA512

      8a2c7ce85e4220b647f19cf4d965874af8266f7f69cd74b909b12751f3272467ac09c39e288765d697313ef5a6b47faa814ecafc0eeac2580fd5a4fbc1c2e1f5

    • \Users\Admin\AppData\Local\Temp\svchsot.exe

      Filesize

      31KB

      MD5

      ed797d8dc2c92401985d162e42ffa450

      SHA1

      0f02fc517c7facc4baefde4fe9467fb6488ebabe

      SHA256

      b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e

      SHA512

      e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2

    • memory/2120-50-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2164-47-0x00000000744B0000-0x0000000074A5B000-memory.dmp

      Filesize

      5.7MB

    • memory/2164-2-0x00000000744B0000-0x0000000074A5B000-memory.dmp

      Filesize

      5.7MB

    • memory/2164-1-0x00000000744B0000-0x0000000074A5B000-memory.dmp

      Filesize

      5.7MB

    • memory/2164-0-0x00000000744B1000-0x00000000744B2000-memory.dmp

      Filesize

      4KB

    • memory/2588-15-0x00000000744B0000-0x0000000074A5B000-memory.dmp

      Filesize

      5.7MB

    • memory/2588-8-0x00000000744B0000-0x0000000074A5B000-memory.dmp

      Filesize

      5.7MB

    • memory/2964-34-0x0000000000400000-0x00000000004C7000-memory.dmp

      Filesize

      796KB

    • memory/2964-40-0x0000000000400000-0x00000000004C7000-memory.dmp

      Filesize

      796KB

    • memory/2964-36-0x0000000000400000-0x00000000004C7000-memory.dmp

      Filesize

      796KB

    • memory/2964-46-0x0000000000400000-0x00000000004C7000-memory.dmp

      Filesize

      796KB

    • memory/2964-32-0x0000000000400000-0x00000000004C7000-memory.dmp

      Filesize

      796KB

    • memory/2964-30-0x0000000000400000-0x00000000004C7000-memory.dmp

      Filesize

      796KB

    • memory/2964-43-0x0000000000400000-0x00000000004C7000-memory.dmp

      Filesize

      796KB

    • memory/2964-42-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2964-26-0x0000000000400000-0x00000000004C7000-memory.dmp

      Filesize

      796KB

    • memory/2964-38-0x0000000000400000-0x00000000004C7000-memory.dmp

      Filesize

      796KB

    • memory/2964-48-0x0000000000400000-0x00000000004C7000-memory.dmp

      Filesize

      796KB

    • memory/2964-28-0x0000000000400000-0x00000000004C7000-memory.dmp

      Filesize

      796KB

    • memory/2964-51-0x0000000000400000-0x00000000004C7000-memory.dmp

      Filesize

      796KB