Analysis

  • max time kernel
    150s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-11-2024 16:34

General

  • Target

    848671a2c723751f6d07a877bed1a3ce_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    848671a2c723751f6d07a877bed1a3ce

  • SHA1

    f1e32c4790d3f36aeb3c5eab20b1d194e21fc8ea

  • SHA256

    7df4c500bbbb1f05457bb7ec67c0ce68079cf5624f2d0abd1fb03451176769c4

  • SHA512

    49b234b224cbaa64fd34b7914a2c080cc51b77d121639d1dc80d0482c28bebfa185e7561326183b196c784fe3fee49d578f0459f239c6259601179e5519c8fab

  • SSDEEP

    24576:vElyxYn5DlpOy2rqtIXl++F5QD5Z54uUoCsmfWQVWoNoS/pQJOhO+sA+At:vElvndO4tqTQD5dUts01uUQUCA7

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\848671a2c723751f6d07a877bed1a3ce_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\848671a2c723751f6d07a877bed1a3ce_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1836
    • C:\Users\Admin\AppData\Local\Temp\file1.exe
      file1.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\file1.exe

    Filesize

    843KB

    MD5

    1d5ea6df4c1793c707edfe81767a2d24

    SHA1

    8568bb0b3b87a8e1229f00a201a3f8b13eac95ff

    SHA256

    2353d9eba046c95a34fbd6391aded0d65c570282c28c7e01776d632590afe146

    SHA512

    6bf2e3ab59bc2b0187a752358e049d8bfe8177c5821810978536c45d8463d8f8438c825b03c3ecda4d6aedae097a669ec22852fef984c7a5716769415dda3de4

  • memory/1836-0-0x00007FFA9AE35000-0x00007FFA9AE36000-memory.dmp

    Filesize

    4KB

  • memory/1836-1-0x000000001B100000-0x000000001B1A6000-memory.dmp

    Filesize

    664KB

  • memory/1836-2-0x00007FFA9AB80000-0x00007FFA9B521000-memory.dmp

    Filesize

    9.6MB

  • memory/1836-4-0x00007FFA9AB80000-0x00007FFA9B521000-memory.dmp

    Filesize

    9.6MB

  • memory/1836-3-0x000000001B680000-0x000000001BB4E000-memory.dmp

    Filesize

    4.8MB

  • memory/1836-5-0x000000001BC70000-0x000000001BD0C000-memory.dmp

    Filesize

    624KB

  • memory/1836-6-0x0000000000A30000-0x0000000000A38000-memory.dmp

    Filesize

    32KB

  • memory/1836-7-0x000000001BDD0000-0x000000001BE1C000-memory.dmp

    Filesize

    304KB

  • memory/1836-13-0x00007FFA9AB80000-0x00007FFA9B521000-memory.dmp

    Filesize

    9.6MB

  • memory/1836-14-0x00007FFA9AB80000-0x00007FFA9B521000-memory.dmp

    Filesize

    9.6MB