Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2024 14:23

General

  • Target

    85e75f2074d35bd1e81b832f176a3e5a_JaffaCakes118.exe

  • Size

    756KB

  • MD5

    85e75f2074d35bd1e81b832f176a3e5a

  • SHA1

    7efa74c89aab66d12f41068122ecbe8460372a34

  • SHA256

    ff44f7e6e14d8360ea0b2483f86e153f224b53e47dd7434cecf5ea71621d6d36

  • SHA512

    9a2ff42f85f5832b032d4b0ad5dc5f668efa99de027145f022ecf05bdc518d70a0c27ba4e1963650c3d1f20ef3e31b60f7b43a06fffaf030d645cbbc6e5302bc

  • SSDEEP

    12288:T9AFlAd0Z+89cxTGzO4AucTD8QP2lmFSrVs9LqnKZqMd0QZh9u:RAQ6Zx9cxTmOrucTIEFSpOGED0QZh9u

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Windows security modification 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85e75f2074d35bd1e81b832f176a3e5a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\85e75f2074d35bd1e81b832f176a3e5a_JaffaCakes118.exe"
    1⤵
    • Modifies firewall policy service
    • Modifies security service
    • Windows security bypass
    • Disables RegEdit via registry modification
    • Checks BIOS information in registry
    • Windows security modification
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2696-0-0x0000000000400000-0x0000000000401000-memory.dmp

    Filesize

    4KB

  • memory/2696-1-0x0000000013140000-0x000000001320F000-memory.dmp

    Filesize

    828KB

  • memory/2696-2-0x0000000013140000-0x000000001320F000-memory.dmp

    Filesize

    828KB

  • memory/2696-3-0x0000000013140000-0x000000001320F000-memory.dmp

    Filesize

    828KB

  • memory/2696-4-0x0000000013140000-0x000000001320F000-memory.dmp

    Filesize

    828KB

  • memory/2696-5-0x0000000013140000-0x000000001320F000-memory.dmp

    Filesize

    828KB

  • memory/2696-6-0x0000000013140000-0x000000001320F000-memory.dmp

    Filesize

    828KB

  • memory/2696-7-0x0000000013140000-0x000000001320F000-memory.dmp

    Filesize

    828KB

  • memory/2696-8-0x0000000013140000-0x000000001320F000-memory.dmp

    Filesize

    828KB

  • memory/2696-9-0x0000000013140000-0x000000001320F000-memory.dmp

    Filesize

    828KB

  • memory/2696-10-0x0000000013140000-0x000000001320F000-memory.dmp

    Filesize

    828KB

  • memory/2696-11-0x0000000013140000-0x000000001320F000-memory.dmp

    Filesize

    828KB

  • memory/2696-12-0x0000000013140000-0x000000001320F000-memory.dmp

    Filesize

    828KB

  • memory/2696-13-0x0000000013140000-0x000000001320F000-memory.dmp

    Filesize

    828KB

  • memory/2696-14-0x0000000013140000-0x000000001320F000-memory.dmp

    Filesize

    828KB