Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 13:34

General

  • Target

    57b7df8a95bcb662ee8265c3bf15ef2f_JaffaCakes118.exe

  • Size

    404KB

  • MD5

    57b7df8a95bcb662ee8265c3bf15ef2f

  • SHA1

    2dda9d1e85c819d3858fb05b894d96aa3900004d

  • SHA256

    dbabc36e5e839d5ed494b445ca299a6e9e54efe0e03f64e2afa285cc64f34b51

  • SHA512

    5c70f525db0b5c46de87dea77456368c4737416fc91f3b5d37890fd7b4a60aea5dd5b902a62f6e696c39d0a8ee2dfe35715cd5706886eb2077b896f1e56531a6

  • SSDEEP

    12288:clghoSqkNJ/Jj0vhgskOzkvCtZvAhvSrY6q6M:yg2kNb0vf9Dt2P9J

Malware Config

Extracted

Family

darkcomet

Botnet

Server

C2

holahoop14.no-ip.biz:222

Mutex

DC_MUTEX-8RMKN4F

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    kggQNoLXaaqt

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57b7df8a95bcb662ee8265c3bf15ef2f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\57b7df8a95bcb662ee8265c3bf15ef2f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Users\Admin\AppData\Local\Temp\Stage2.exe
      "C:\Users\Admin\AppData\Local\Temp\Stage2.exe" x -y -oC:\Users\Admin\AppData\Local\Temp -pxnq8rPMxVI87ciGwWJHxRTy3iauHcIirteOOELv3B5vkS9kJoHBUAahY1dWxj8yA
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2608
    • C:\Users\Admin\AppData\Local\Temp\Stage1.exe
      "C:\Users\Admin\AppData\Local\Temp\Stage1.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
        "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Stage1.exe

    Filesize

    253KB

    MD5

    af392b292d8d7914df9fc6c91f15e109

    SHA1

    8a408dc39225ce1aebac7c835b914a42fc96a847

    SHA256

    5b43dfa6014ac5f481c888355475754b8cf0451335a701f4923e240b486767d2

    SHA512

    98ab13e60a7a5eabe4a5db2c2bfe5def6783ec248baa9c9af87a4b175e78ae4e65c4472cfd07544bb4441a4f54415e27ad050719e01a873cf1786a8a09e2463f

  • \Users\Admin\AppData\Local\Temp\Stage2.exe

    Filesize

    358KB

    MD5

    552323029bd0547efb7d469a8b28eb89

    SHA1

    3d00da046efc3a6933794561c3f8200c0e8783e2

    SHA256

    113e57c1aa2142b730ef263792459d0ea0a15b936c672ad7b6f381859d0c1042

    SHA512

    0f0cec1136a313a0092973ee39244f17024c3451a95849a07f6a2a5c5983bd80a6f23d6c3510143b459df21545d2b79c6f7873adb0f21abfbf9d68fea922e442

  • memory/1392-0-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1392-5-0x0000000002A60000-0x0000000002AA3000-memory.dmp

    Filesize

    268KB

  • memory/1392-37-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1392-19-0x0000000002A60000-0x0000000002B1A000-memory.dmp

    Filesize

    744KB

  • memory/1392-40-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1392-20-0x0000000002A60000-0x0000000002B1A000-memory.dmp

    Filesize

    744KB

  • memory/2608-15-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2628-23-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2628-22-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2628-33-0x00000000035F0000-0x00000000036AA000-memory.dmp

    Filesize

    744KB

  • memory/2628-36-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2788-41-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2788-47-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2788-42-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2788-43-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2788-44-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2788-45-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2788-46-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2788-39-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2788-48-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2788-49-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2788-50-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2788-51-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2788-52-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2788-53-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2788-54-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2788-55-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB