Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2024 10:46

General

  • Target

    793cab4421c321b969ce88f22d90752c_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    793cab4421c321b969ce88f22d90752c

  • SHA1

    55b461d66391147bf8f7c0179f7a0b2abed6d9b5

  • SHA256

    b780a8572b59d2eeb633fd896cc4982508aacee23bce257396a80e7ea29b2bc3

  • SHA512

    b02df864c6ec4c7ebede94b3bf31b66b5332f3e8b4ece9600a2b282dec06885965279adbf36b8e08d590cfcb5aeb0e113a273eb4476c5fc86e321c4cb73e4075

  • SSDEEP

    24576:eaHMv6CorjqnyC8flDAgjk6GECzbMpJgCUwJvfoIfaAl3Ein+ozerISUfE:e1vqjdC8tD5jk6/wbMTgCUaoIfaKb+ok

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

testcybergate.zapto.org:3014

Mutex

DC_MUTEX-F48XL4B

Attributes
  • gencode

    EWr2RqlAQCdR

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Extracted

Family

latentbot

C2

testcybergate.zapto.org

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Latentbot family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\793cab4421c321b969ce88f22d90752c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\793cab4421c321b969ce88f22d90752c_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Local\Temp\uncrypted.exe
      "C:\Users\Admin\AppData\Local\Temp\uncrypted.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\autB3DF.tmp

    Filesize

    659KB

    MD5

    92499f0ef985be878a6373743b77d6a2

    SHA1

    c60aa4820aa41f9f6dafef25e4ad9f8d010c88f9

    SHA256

    a53ecd5d2893a6325776ea9135b2532f1f68ceca6dae90db8de531b883b1571a

    SHA512

    27e3fe6a6bfc43c4e4f1c64570e5beebc773cb6cd9b043e8ccef4c57821bda6fa560d2abe34326ab1563ecedace0d02c1d1c3676f18f35bfa47df5df05b98b7e

  • C:\Users\Admin\AppData\Local\Temp\uncrypted.exe

    Filesize

    659KB

    MD5

    c798c640896c00fc6bb839cdd3810e24

    SHA1

    8a386de287c0d1bf3e3c322e1957eb9055a0aedb

    SHA256

    31be1a973731be787d2d717e36a1447eaf2a6d81eade0e0a77329f0692d3e699

    SHA512

    10e40c9b6dd2d37fef6df7c0b43ecfc39f49f9b28e2c25d0df1aa1c38b8311d1897db7b0de36a9c2b95ea8f2901e66607b2fa1527f330d6499ff7d34463d8729

  • memory/1292-25-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1292-28-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1292-21-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1292-22-0x00000000023E0000-0x00000000023E1000-memory.dmp

    Filesize

    4KB

  • memory/1292-23-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1292-24-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1292-35-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1292-26-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1292-27-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1292-20-0x00000000023E0000-0x00000000023E1000-memory.dmp

    Filesize

    4KB

  • memory/1292-29-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1292-30-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1292-31-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1292-32-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1292-33-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1292-34-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1620-0-0x0000000000400000-0x00000000004E1000-memory.dmp

    Filesize

    900KB