Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2024 14:07

General

  • Target

    62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    62a0472fcfcad798692ab44daddd233d

  • SHA1

    bf857bf4667d167e82b39c95bc0ac9d5ee0136a3

  • SHA256

    b24500f0f082966518725371932717cfcfce280be723755cfa52ac183b2d1f8f

  • SHA512

    34ac14d268761d4f6e1d147eb847c7ddc5529b6972b47cb51e55ccf47e15b1bcefe206e0d4069ff35f631a43b684af1bcddc75da887a8fafb873422827a7968c

  • SSDEEP

    24576:iaCwtiqV012KXkJHsYiyGQWgANWGyo70zWGT8y5N7+:W56xi9ZUGFqxy

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Users\Admin\AppData\Local\Temp\62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Users\Admin\AppData\Roaming\MHRMI.exe
        "C:\Users\Admin\AppData\Roaming\MHRMI.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2728
    • C:\Users\Admin\AppData\Local\Temp\62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\62a0472fcfcad798692ab44daddd233d_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1604
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\RVHFJ.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Security" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Security\security.exe" /f
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:1600
      • C:\Users\Admin\AppData\Roaming\Security\security.exe
        "C:\Users\Admin\AppData\Roaming\Security\security.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2168
        • C:\Users\Admin\AppData\Roaming\Security\security.exe
          "C:\Users\Admin\AppData\Roaming\Security\security.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:980
        • C:\Users\Admin\AppData\Roaming\Security\security.exe
          "C:\Users\Admin\AppData\Roaming\Security\security.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1852
        • C:\Users\Admin\AppData\Roaming\Security\security.exe
          "C:\Users\Admin\AppData\Roaming\Security\security.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RVHFJ.bat

    Filesize

    147B

    MD5

    6f473a1ba53e043362047f72e20b34f4

    SHA1

    e8f121a589e1207ed950453376ee1d21b1223835

    SHA256

    5fbce2c77a90ba9edbcf60be3851ab81633b7c10b1babb624d475c7be589de4b

    SHA512

    b4976d40bc708ae6cddf367a5382cd532e4cf235b848cdaa4e4d317e06d9126e50745a7772591bc21dc7380689f4399e57501b0aa73cd231bce32e22d53b0818

  • C:\Users\Admin\AppData\Roaming\MHRMI.exe

    Filesize

    396KB

    MD5

    97dfac6e0541c19a7cc8adb8fe322d4e

    SHA1

    3d30f9a61e70ee3970d041a83c5f64ae84bddf0b

    SHA256

    247c8b720d4ffa93f1b1f72d6df7dcacd80fb91d8f6747a339ba75fe690d89d1

    SHA512

    61ae747e122fa662035ddb29476a8381f320f8c3ba9dd3ceeb4a91e85eba61104a10a6461d54eca14a90be393745cda09222ddb29985d996ce8855b2bba27888

  • \Users\Admin\AppData\Roaming\Security\security.exe

    Filesize

    1.2MB

    MD5

    b785316e4cd0e98059f057e2f19a2232

    SHA1

    cd366d0ffc85cd024cc650518decc2357ddbc39f

    SHA256

    003a0f2cb8005aeed5da056a1c4ed56433090d59b04b485d7a4f5b660e30e330

    SHA512

    b1986c45b64e89fd77341e035922f82dea30e0cc8a20ca42ea9c5abaf6f86b1ca7a48fb74434255623ed42c838aa5d727c6599493ca09c8bfef4bacee341c79b

  • memory/980-328-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/980-335-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/1208-160-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/1208-380-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/1604-145-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1604-143-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1604-161-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1604-376-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1604-147-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1852-385-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1852-373-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2840-66-0x0000000002730000-0x0000000002731000-memory.dmp

    Filesize

    4KB

  • memory/2840-46-0x0000000002A60000-0x0000000002A61000-memory.dmp

    Filesize

    4KB

  • memory/2840-24-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2840-14-0x0000000002A90000-0x0000000002A91000-memory.dmp

    Filesize

    4KB

  • memory/2840-12-0x0000000002A90000-0x0000000002A91000-memory.dmp

    Filesize

    4KB

  • memory/2840-4-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2840-2-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2840-36-0x0000000001EA0000-0x0000000001EA1000-memory.dmp

    Filesize

    4KB

  • memory/2840-38-0x0000000001EA0000-0x0000000001EA1000-memory.dmp

    Filesize

    4KB

  • memory/2840-26-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2840-48-0x0000000002A60000-0x0000000002A61000-memory.dmp

    Filesize

    4KB

  • memory/2840-56-0x0000000002C50000-0x0000000002C51000-memory.dmp

    Filesize

    4KB

  • memory/2840-58-0x0000000002C50000-0x0000000002C51000-memory.dmp

    Filesize

    4KB

  • memory/2840-68-0x0000000002730000-0x0000000002731000-memory.dmp

    Filesize

    4KB

  • memory/2840-76-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2840-78-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2840-96-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2840-130-0x0000000002AA0000-0x0000000002B77000-memory.dmp

    Filesize

    860KB