Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 21:19

General

  • Target

    90b6794962b74f3151d35adc24551127_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    90b6794962b74f3151d35adc24551127

  • SHA1

    401828abdd1e79b906450920c6e8975be8f25681

  • SHA256

    ce83f23a926ff4356fa39f7ba83d83816896ce9a15da62cf7a8e262e5cafd7ac

  • SHA512

    91897135d4aa3bcc56f07b1b29851c6bfe60a2418218c32dc7eb4dfc31281a649f7466fde48e789dec6c76b48c65eefb8cf3486bf304fa238d01a19fbb7c6a52

  • SSDEEP

    12288:qXFrzeLNlDwvCdEkyPF6kfSHIaODwIMk13+ahBYNTQsEE0swRhTfCX8hq0QXNYXb:qMvDmTEHw3qKhhoucqMy5ugc+

Malware Config

Extracted

Family

darkcomet

Botnet

Gr8

C2

gr8.redirectme.net:3030

gr8.bounceme.net:3030

gr8.3utilities.come:3030

Mutex

DC_MUTEX-NYP0ZXN

Attributes
  • gencode

    5xSpfjB5D01x

  • install

    false

  • offline_keylogger

    true

  • password

    nolongthing

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90b6794962b74f3151d35adc24551127_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\90b6794962b74f3151d35adc24551127_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\90b6794962b74f3151d35adc24551127_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\90b6794962b74f3151d35adc24551127_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Users\Admin\AppData\Roaming\WLXPhotoGallery.exe
        C:\Users\Admin\AppData\Roaming\WLXPhotoGallery.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2548
    • C:\Users\Admin\AppData\Roaming\WLXPhotoGallery.exe
      C:\Users\Admin\AppData\Roaming\WLXPhotoGallery.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2520
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\BabyAngelica.jpg

    Filesize

    19KB

    MD5

    6fc341ea53ee6bc60847c1f70d4bbf07

    SHA1

    52862d1486dde268980b572a0c64449d3027890c

    SHA256

    cccb87a6c991e85753e9f8414271331f167b83b05a1580a4f6d7f7f7cf339be2

    SHA512

    7869859c23db839675abd3749852d4b38080b830e760adea8eeacb2eb830f725963f7fa5dcae72b6ad087670399c5a8fabaa9c0a9a7ef79cc6095e57d8f375c8

  • \Users\Admin\AppData\Roaming\WLXPhotoGallery.exe

    Filesize

    1KB

    MD5

    7d7c063af11362f46af6241bf365afa2

    SHA1

    757d14b1a6506925662daaa7aaebabd3e3f45715

    SHA256

    007172e8f2d18f5297b182259026fbc7aad8c6394ef7c7c93be485c6f23c426a

    SHA512

    2fae064657bb2ca3faeb0a163d42b7e812329babd7ce90163b1bf7b9d0fd1f58552fbce4d317b2a1e7be7f3356733e6755e44469858609049c0630ecf4a966ea

  • memory/1964-32-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/1964-0-0x0000000074051000-0x0000000074052000-memory.dmp

    Filesize

    4KB

  • memory/1964-31-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/1964-1-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/1964-2-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/1964-17-0x0000000004550000-0x0000000004552000-memory.dmp

    Filesize

    8KB

  • memory/2520-29-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-48-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-41-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-22-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-23-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-47-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-15-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-46-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-45-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-34-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-44-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-43-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-36-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-37-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-38-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-39-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-40-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-19-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2548-42-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/2712-18-0x0000000000120000-0x0000000000122000-memory.dmp

    Filesize

    8KB

  • memory/2896-35-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2896-4-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2896-5-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2896-6-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2896-33-0x0000000074050000-0x00000000745FB000-memory.dmp

    Filesize

    5.7MB