Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-11-2024 08:17

General

  • Target

    8a7b28ececd740ba77ed7ac264793865_JaffaCakes118.exe

  • Size

    924KB

  • MD5

    8a7b28ececd740ba77ed7ac264793865

  • SHA1

    c7c3b55424a654613bb6d4f32c1ebbc87ac839c6

  • SHA256

    66254aea3cdef64b2742b9e33553ab42de2009c5d1368f9a3fe601af5b415e32

  • SHA512

    8499dc97eac611ee8a56927bdf009df51b85309cd3979f8c1848778d883da6bbfa7d5bdb921bc31e578837d266cacbf480e4bde7b3a3232832442138addf7d95

  • SSDEEP

    24576:Dxdt37sx7y5DZh1b4q9ayM5HEP3hjD7WQoa:DLtLdKt163Zq

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a7b28ececd740ba77ed7ac264793865_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8a7b28ececd740ba77ed7ac264793865_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:956
    • C:\Users\Admin\Documents\8a7b28ececd740ba77ed7ac264793865_JaffaCakes118.exe
      "C:\Users\Admin\Documents\8a7b28ececd740ba77ed7ac264793865_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3512
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        3⤵
          PID:5084
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 12
            4⤵
            • Program crash
            PID:1748
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5084 -ip 5084
      1⤵
        PID:2432

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\8a7b28ececd740ba77ed7ac264793865_JaffaCakes118.exe.log

        Filesize

        319B

        MD5

        600936e187ce94453648a9245b2b42a5

        SHA1

        3349e5da3f713259244a2cbcb4a9dca777f637ed

        SHA256

        1493eb1dc75a64eb2eb06bc9eb2c864b78fc4a2c674108d5183ac7824013ff2d

        SHA512

        d41203f93ed77430dc570e82dc713f09d21942d75d1f9c3c84135421550ac2fa3845b7e46df70d2c57fe97d3a88e43c672771bb8b6433c44584c4e64646c1964

      • C:\Users\Admin\Documents\8a7b28ececd740ba77ed7ac264793865_JaffaCakes118.exe

        Filesize

        924KB

        MD5

        8a7b28ececd740ba77ed7ac264793865

        SHA1

        c7c3b55424a654613bb6d4f32c1ebbc87ac839c6

        SHA256

        66254aea3cdef64b2742b9e33553ab42de2009c5d1368f9a3fe601af5b415e32

        SHA512

        8499dc97eac611ee8a56927bdf009df51b85309cd3979f8c1848778d883da6bbfa7d5bdb921bc31e578837d266cacbf480e4bde7b3a3232832442138addf7d95

      • C:\Users\Admin\Documents\aclui.dll

        Filesize

        17KB

        MD5

        e99f74ae594c1b373fa0d34193dce208

        SHA1

        3933f949724a6702e0038295287a39c53592b11e

        SHA256

        1dbb3b418bd78abb49d583f2b9cea6b20fe9fece0a59c118ddf104a672e29ebd

        SHA512

        355a2a3955e0f50b0c41a24589b9283892689faa61aea6360a1b762f5f2f58166c579b37dc0b003e716c1dc760f1931b73faf6fa3e2b21f8571dbdf5ee37c030

      • memory/956-0-0x0000000075512000-0x0000000075513000-memory.dmp

        Filesize

        4KB

      • memory/956-1-0x0000000075510000-0x0000000075AC1000-memory.dmp

        Filesize

        5.7MB

      • memory/956-2-0x0000000075510000-0x0000000075AC1000-memory.dmp

        Filesize

        5.7MB

      • memory/956-17-0x0000000075510000-0x0000000075AC1000-memory.dmp

        Filesize

        5.7MB

      • memory/3512-16-0x0000000075510000-0x0000000075AC1000-memory.dmp

        Filesize

        5.7MB

      • memory/3512-18-0x0000000075510000-0x0000000075AC1000-memory.dmp

        Filesize

        5.7MB

      • memory/3512-21-0x0000000075510000-0x0000000075AC1000-memory.dmp

        Filesize

        5.7MB

      • memory/3512-40-0x0000000075510000-0x0000000075AC1000-memory.dmp

        Filesize

        5.7MB

      • memory/5084-38-0x0000000013140000-0x00000000131F6000-memory.dmp

        Filesize

        728KB