Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-10-2024 16:37

General

  • Target

    4de1c5485e4e5193eea571dbc6d0606d_JaffaCakes118.exe

  • Size

    898KB

  • MD5

    4de1c5485e4e5193eea571dbc6d0606d

  • SHA1

    81b4123710e7f6a012b6680be179671586c85f66

  • SHA256

    d3a4ebd2f8291633618bbec77f27b8c9bd7fef27e60a47c206f3d8c41aeded6c

  • SHA512

    d292b84daeefbb1166e61f718760aa1d44f7ec195f7948633e87e369cf236ec4d67c314611941903205ff077ca9de1894c7805d181a27bedc857616d4e68bc03

  • SSDEEP

    24576:3dQoweo+5d5lW4T0LReq86st68g6if0uGbS21tA23:3dQGo8h41iDghWSi

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

95.79.31.101:1604

Mutex

DC_MUTEX-E2ZGDTS

Attributes
  • InstallPath

    MSDCSC\svchost.exe

  • gencode

    rW8pc78Q0Uk7

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4de1c5485e4e5193eea571dbc6d0606d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4de1c5485e4e5193eea571dbc6d0606d_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\2929.exe
      "C:\Users\Admin\AppData\Local\Temp\2929.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Windows\SysWOW64\notepad.exe
        notepad
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3332
      • C:\Users\Admin\Documents\MSDCSC\svchost.exe
        "C:\Users\Admin\Documents\MSDCSC\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4044
    • C:\Users\Admin\AppData\Local\Temp\HardDiskSerialNumberChanger.exe
      "C:\Users\Admin\AppData\Local\Temp\HardDiskSerialNumberChanger.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      PID:2308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2929.exe

    Filesize

    690KB

    MD5

    1c1e287690221213a5a450e099a57c38

    SHA1

    3406b8d85028fdd610a656e8bcc792b918576456

    SHA256

    4c4f37f35696c74f98a3eb4231f520f03a1b7d797ff2ef3751ad411f722ef593

    SHA512

    0f669c05d7857fbd68fac19bab740dce81904d7c74531e96f7ddb2ba5fb1d648649cc284fcc03a62a08b47054a0c2e94391fe8bac0e5ec9c592eb441c40441c4

  • C:\Users\Admin\AppData\Local\Temp\HardDiskSerialNumberChanger.exe

    Filesize

    636KB

    MD5

    c20e96d4e616ce333c19a1c15a1cc137

    SHA1

    f79645ec115130ee59958c55a556f564260b7a9e

    SHA256

    2c141c06f7df57f11ef2c62f2a96093484a65df47065b1a475c53784af0e2664

    SHA512

    519fec9955c4a18e45ec68d9e7dc2bcda74721a6ea088e59e634e26b136bfa15f5efedf8839c036a3cfdcdb9780a2121dc2d71f1fdbbfd3df02d9969e5db753b

  • memory/2308-25-0x00000000006C0000-0x00000000006C1000-memory.dmp

    Filesize

    4KB

  • memory/2308-86-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/3040-20-0x00000000023F0000-0x00000000023F1000-memory.dmp

    Filesize

    4KB

  • memory/3040-84-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/3332-24-0x00000000012D0000-0x00000000012D1000-memory.dmp

    Filesize

    4KB

  • memory/4044-87-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/4044-89-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB