Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2024 04:49

General

  • Target

    5aea56156ab7da5161f1d14261e77bd5_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    5aea56156ab7da5161f1d14261e77bd5

  • SHA1

    709050c574a9426c3058e216ff04538fe7b0488e

  • SHA256

    0c1296c11ed22130856eb97d47c8339936e92012fa7a9922b51ea14ecb9d8f64

  • SHA512

    ca642d6c9883e13dddd7565170480ae1dbe2f5fbcf11a41fe0b3ad299db955ac27707427bfdf3c76fbb4527010f83dc7339b24bb2f64d64cb389dc383445ae4b

  • SSDEEP

    24576:UV63UYgSZUX6dsgw83xUJjGXT3pcXRKY59Z1nRZI:VUWPjMZK

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

guyfawkesfc.no-ip.org:1604

Mutex

DC_MUTEX-MQD9M76

Attributes
  • gencode

    TWryUTMgn8jV

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5aea56156ab7da5161f1d14261e77bd5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5aea56156ab7da5161f1d14261e77bd5_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3120
    • C:\Users\Admin\AppData\Local\Temp\Floodjvc.exe
      "C:\Users\Admin\AppData\Local\Temp\Floodjvc.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1084
    • C:\Users\Admin\AppData\Local\Temp\test.exe
      "C:\Users\Admin\AppData\Local\Temp\test.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4396
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Floodjvc.exe

    Filesize

    46KB

    MD5

    b31884828f329fd0fc1f6e9336f97491

    SHA1

    5d1ec9182ca83a9200d335d1e20511598cebc5eb

    SHA256

    4290921396db0980b244a5420be4e11eddf5e127c8de6c051a6224c98272b99c

    SHA512

    e3f5bd12bd4dbd6ecdfad69a6965186ec40b8440b1d00cfb95e7c77860a48542c6cc1a08e10b69584a9d19313cb7a2a3b0fea8710c060e36827f7503ee667428

  • C:\Users\Admin\AppData\Local\Temp\test.exe

    Filesize

    758KB

    MD5

    28205def139e7630b9ede4ecff7d5480

    SHA1

    cc82f953e7a221438ddadc8a61f4dd27aeaea824

    SHA256

    61bf4f5c234956c6fd66a0fdc3e08277efc88b4520be4cb2f6b6dea72d6c692d

    SHA512

    9f0c9733840f4898dafd2db04ca357a62ad2b11df72a4c3a6743afcb37cfed2cf492d7c7949e6d638f1b3edeffc7e56374c3112e3422cffd7f74fcd1dedee1be

  • memory/1084-31-0x00000000009D0000-0x00000000009E2000-memory.dmp

    Filesize

    72KB

  • memory/1084-40-0x00000000055E0000-0x00000000055F0000-memory.dmp

    Filesize

    64KB

  • memory/1084-36-0x0000000005580000-0x000000000558A000-memory.dmp

    Filesize

    40KB

  • memory/1084-35-0x00000000055E0000-0x00000000055F0000-memory.dmp

    Filesize

    64KB

  • memory/1084-34-0x00000000053C0000-0x0000000005452000-memory.dmp

    Filesize

    584KB

  • memory/1084-33-0x0000000005A40000-0x0000000005FE4000-memory.dmp

    Filesize

    5.6MB

  • memory/1084-27-0x000000007463E000-0x000000007463F000-memory.dmp

    Filesize

    4KB

  • memory/2672-60-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2672-49-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2672-54-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2672-55-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2672-61-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2672-53-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2672-52-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2672-59-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2672-58-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2672-57-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2672-51-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2672-41-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2672-45-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2672-56-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2672-48-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2672-47-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2672-50-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/3120-32-0x00007FF94BC60000-0x00007FF94C601000-memory.dmp

    Filesize

    9.6MB

  • memory/3120-1-0x000000001B390000-0x000000001B436000-memory.dmp

    Filesize

    664KB

  • memory/3120-2-0x00007FF94BC60000-0x00007FF94C601000-memory.dmp

    Filesize

    9.6MB

  • memory/3120-4-0x00007FF94BC60000-0x00007FF94C601000-memory.dmp

    Filesize

    9.6MB

  • memory/3120-0-0x00007FF94BF15000-0x00007FF94BF16000-memory.dmp

    Filesize

    4KB

  • memory/4396-30-0x0000000074DE0000-0x0000000075391000-memory.dmp

    Filesize

    5.7MB

  • memory/4396-46-0x0000000074DE0000-0x0000000075391000-memory.dmp

    Filesize

    5.7MB

  • memory/4396-38-0x0000000074DE2000-0x0000000074DE3000-memory.dmp

    Filesize

    4KB

  • memory/4396-39-0x0000000074DE0000-0x0000000075391000-memory.dmp

    Filesize

    5.7MB

  • memory/4396-37-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

    Filesize

    64KB

  • memory/4396-28-0x0000000000ED0000-0x0000000000EE0000-memory.dmp

    Filesize

    64KB

  • memory/4396-29-0x0000000074DE2000-0x0000000074DE3000-memory.dmp

    Filesize

    4KB