Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2024 08:17

General

  • Target

    8a7b28ececd740ba77ed7ac264793865_JaffaCakes118.exe

  • Size

    924KB

  • MD5

    8a7b28ececd740ba77ed7ac264793865

  • SHA1

    c7c3b55424a654613bb6d4f32c1ebbc87ac839c6

  • SHA256

    66254aea3cdef64b2742b9e33553ab42de2009c5d1368f9a3fe601af5b415e32

  • SHA512

    8499dc97eac611ee8a56927bdf009df51b85309cd3979f8c1848778d883da6bbfa7d5bdb921bc31e578837d266cacbf480e4bde7b3a3232832442138addf7d95

  • SSDEEP

    24576:Dxdt37sx7y5DZh1b4q9ayM5HEP3hjD7WQoa:DLtLdKt163Zq

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a7b28ececd740ba77ed7ac264793865_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8a7b28ececd740ba77ed7ac264793865_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Users\Admin\Documents\8a7b28ececd740ba77ed7ac264793865_JaffaCakes118.exe
      "C:\Users\Admin\Documents\8a7b28ececd740ba77ed7ac264793865_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        3⤵
          PID:2916

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\aclui.dll

      Filesize

      17KB

      MD5

      e99f74ae594c1b373fa0d34193dce208

      SHA1

      3933f949724a6702e0038295287a39c53592b11e

      SHA256

      1dbb3b418bd78abb49d583f2b9cea6b20fe9fece0a59c118ddf104a672e29ebd

      SHA512

      355a2a3955e0f50b0c41a24589b9283892689faa61aea6360a1b762f5f2f58166c579b37dc0b003e716c1dc760f1931b73faf6fa3e2b21f8571dbdf5ee37c030

    • \Users\Admin\Documents\8a7b28ececd740ba77ed7ac264793865_JaffaCakes118.exe

      Filesize

      924KB

      MD5

      8a7b28ececd740ba77ed7ac264793865

      SHA1

      c7c3b55424a654613bb6d4f32c1ebbc87ac839c6

      SHA256

      66254aea3cdef64b2742b9e33553ab42de2009c5d1368f9a3fe601af5b415e32

      SHA512

      8499dc97eac611ee8a56927bdf009df51b85309cd3979f8c1848778d883da6bbfa7d5bdb921bc31e578837d266cacbf480e4bde7b3a3232832442138addf7d95

    • memory/2596-43-0x0000000074330000-0x00000000748DB000-memory.dmp

      Filesize

      5.7MB

    • memory/2596-15-0x0000000074330000-0x00000000748DB000-memory.dmp

      Filesize

      5.7MB

    • memory/2596-18-0x0000000074330000-0x00000000748DB000-memory.dmp

      Filesize

      5.7MB

    • memory/2604-1-0x0000000074330000-0x00000000748DB000-memory.dmp

      Filesize

      5.7MB

    • memory/2604-2-0x0000000074330000-0x00000000748DB000-memory.dmp

      Filesize

      5.7MB

    • memory/2604-14-0x0000000074330000-0x00000000748DB000-memory.dmp

      Filesize

      5.7MB

    • memory/2604-0-0x0000000074331000-0x0000000074332000-memory.dmp

      Filesize

      4KB

    • memory/2916-32-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/2916-34-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/2916-35-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/2916-36-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/2916-37-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/2916-38-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/2916-39-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/2916-40-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2916-42-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/2916-33-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB