Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2024 10:00

General

  • Target

    7eb914089a7e5d827f4d5912fdf0d1af_JaffaCakes118.exe

  • Size

    302KB

  • MD5

    7eb914089a7e5d827f4d5912fdf0d1af

  • SHA1

    1d469f8216dbff2a98cc6ad2fc1eb262155b82df

  • SHA256

    fb6d24f8c56f6d8ea302f98dd9b16a71d2f4ad43ff17626426b1fcfb5a97d74c

  • SHA512

    c9c2abeff818e41bfda9461985055aaae3c20d370cbabb40a87912cf1d6ba687d1b8a3f67e3c74025e5c1086b3299a30a25eaa353d199cafaad1fef7253ab142

  • SSDEEP

    6144:qXmWOEErIBT+UWnAS0OU9fVagMKl4ukYbZ1bqWviJaxggCGyt5f7vKX:MLiASlU9f4WuW6iyt5GX

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

sora25.no-ip.biz:1604

Mutex

DC_MUTEX-95QWLKK

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    akKgEc3SfEnC

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7eb914089a7e5d827f4d5912fdf0d1af_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7eb914089a7e5d827f4d5912fdf0d1af_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      2⤵
      • Modifies WinLogon for persistence
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe" +s +h
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2988
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe" +s +h
          4⤵
          • Sets file to hidden
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1892
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h
          4⤵
          • Sets file to hidden
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2104
      • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
        "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:668
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\audiadg.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\audiadg.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Users\Admin\AppData\Local\Temp\bcdprov.exe
        "C:\Users\Admin\AppData\Local\Temp\bcdprov.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1896
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
          4⤵
          • Modifies firewall policy service
          • Modifies security service
          • Windows security bypass
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1304
          • C:\Windows\SysWOW64\notepad.exe
            notepad
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bcdprov.exe

    Filesize

    302KB

    MD5

    7eb914089a7e5d827f4d5912fdf0d1af

    SHA1

    1d469f8216dbff2a98cc6ad2fc1eb262155b82df

    SHA256

    fb6d24f8c56f6d8ea302f98dd9b16a71d2f4ad43ff17626426b1fcfb5a97d74c

    SHA512

    c9c2abeff818e41bfda9461985055aaae3c20d370cbabb40a87912cf1d6ba687d1b8a3f67e3c74025e5c1086b3299a30a25eaa353d199cafaad1fef7253ab142

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\audiadg.exe

    Filesize

    11KB

    MD5

    9b3848f7bd575120a33fb480774b5b6b

    SHA1

    9a7ef7a9b4f946f4ddbe2fadb3c52f1fd6991045

    SHA256

    271f73350c0e95d765fe1ccbf4b1fae1f7b62b62a723472a65f562ceab22d791

    SHA512

    02a7364ff655f0a4345b7428f577396a8ec7347f2d8466f4d957b7dd3909baf6b7b403135450b3f142ea275452fbfb418f64f075fba11f808640479d726a73b3

  • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

    Filesize

    54KB

    MD5

    0f01571a3e4c71eb4313175aae86488e

    SHA1

    2ba648afe2cd52edf5f25e304f77d457abf7ac0e

    SHA256

    8cc51c4c2efc8c6a401aa83a0aeced0925d5d9d2a43192f35561893cdf704022

    SHA512

    159dfbb7d385bf92f4fc48ca389b89d69f6c2616e90dfa056e725d7da78a3702694a28f9c5cab7b55adc4d4dbd7bfe5d272c8b1c9931e3ac95f6326d74576794

  • memory/1304-50-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1304-55-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1304-56-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1304-53-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1304-54-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1304-52-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2252-57-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/2520-7-0x0000000073E40000-0x00000000743EB000-memory.dmp

    Filesize

    5.7MB

  • memory/2520-2-0x0000000073E40000-0x00000000743EB000-memory.dmp

    Filesize

    5.7MB

  • memory/2520-0-0x0000000073E41000-0x0000000073E42000-memory.dmp

    Filesize

    4KB

  • memory/2520-1-0x0000000073E40000-0x00000000743EB000-memory.dmp

    Filesize

    5.7MB

  • memory/2860-21-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-19-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-20-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-22-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-43-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-17-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-15-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-10-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-12-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2860-16-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2860-8-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB