Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 06:38

General

  • Target

    99d2656e3599ba235242dc9763b3940b_JaffaCakes118.exe

  • Size

    5.0MB

  • MD5

    99d2656e3599ba235242dc9763b3940b

  • SHA1

    2ac901d260222eed2c8d7f1cdc92ae8d11b50c7b

  • SHA256

    bb14ef332f01f1db8ce7a225adc9fe5f6ee5c4a6ffd2038478065e270080abad

  • SHA512

    af8c8fd9e842ad21feb9da2c06637dc484927714a7c562f2916e1fe4f349bf2a12fd513e750440a02280ee773a8bcaf9df0f97dba5b8cbc7d81c521adee78ce3

  • SSDEEP

    98304:Bp0K5DI69NeNw/V/dMBJ5Yr0M1oDBoMqnE6oNv7rW:BDB/tN/YJOozDBiE667rW

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 28 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99d2656e3599ba235242dc9763b3940b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\99d2656e3599ba235242dc9763b3940b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\99d2656e3599ba235242dc9763b3940b_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\99d2656e3599ba235242dc9763b3940b_JaffaCakes118.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Checks BIOS information in registry
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Users\Admin\AppData\Local\Temp\CCSETUP305.EXE
        "C:\Users\Admin\AppData\Local\Temp\CCSETUP305.EXE"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        PID:1248
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\SysWOW64\explorer.exe"
        3⤵
          PID:2336
        • C:\Users\Admin\AppData\Roaming\Windupdt\winupdate.exe
          "C:\Users\Admin\AppData\Roaming\Windupdt\winupdate.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2236
          • C:\Users\Admin\AppData\Roaming\Windupdt\winupdate.exe
            "C:\Users\Admin\AppData\Roaming\Windupdt\winupdate.exe"
            4⤵
            • Modifies security service
            • Windows security bypass
            • Disables RegEdit via registry modification
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2456
            • C:\Windows\SysWOW64\explorer.exe
              "C:\Windows\SysWOW64\explorer.exe"
              5⤵
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:660
              • C:\Windows\SysWOW64\explorer.exe
                "C:\Windows\SysWOW64\explorer.exe"
                6⤵
                • Modifies security service
                • Windows security bypass
                • Disables RegEdit via registry modification
                • Checks BIOS information in registry
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Enumerates system info in registry
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:304
                • C:\Users\Admin\AppData\Local\Temp\CCSETUP305.EXE
                  "C:\Users\Admin\AppData\Local\Temp\CCSETUP305.EXE"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: GetForegroundWindowSpam
                  PID:1768

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nstC5C1.tmp\modern-wizard.bmp

      Filesize

      9KB

      MD5

      bf670074262a7e29da8c0ff2d94c1438

      SHA1

      5d608a1cb519e5751a4736a6b8e9f3e80477f3e3

      SHA256

      1ea1d0a8b0302840b2ba4743fdef788c93517ac083b7a9da7dd25640251ce061

      SHA512

      6c974589ba1e2939e86216078b5ec8bf750346fa77ee81e85a7842aee42cd33f858de9fd2d6837e264f73ab18c1b1d26c4a29336da4e4b41e83c465371c94ca8

    • \Users\Admin\AppData\Local\Temp\CCSETUP305.EXE

      Filesize

      2.9MB

      MD5

      a0c156da60803807cf6b46ec340c9739

      SHA1

      24aeaf6ff4d2ad611f2e6f61a0e38c46602cae97

      SHA256

      fc35a0c9f5604f78e2c4673d815e493638819d534acc73b834bd4f9fd9d49d48

      SHA512

      5bec9c0cf64cde95267d44b1dba299b7299a827467132400656eaf8b2225b2710a0e986d6a1e9db00f6f94b922ae6592372519a91b03230e92de26052aa5b3ca

    • \Users\Admin\AppData\Local\Temp\nsdD27D.tmp\ButtonEvent.dll

      Filesize

      4KB

      MD5

      fad9d09fc0267e8513b8628e767b2604

      SHA1

      bea76a7621c07b30ed90bedef4d608a5b9e15300

      SHA256

      5d913c6be9c9e13801acc5d78b11d9f3cd42c1b3b3cad8272eb6e1bfb06730c2

      SHA512

      b39c5ea8aea0640f5a32a1fc03e8c8382a621c168980b3bc5e2897932878003b2b8ef75b3ad68149c35420d652143e2ef763b6a47d84ec73621017f0273e2805

    • \Users\Admin\AppData\Local\Temp\nsdD27D.tmp\g\gcapi_dll.dll

      Filesize

      62KB

      MD5

      f6400e8bdca118c6b5170c172fcbc06e

      SHA1

      992d2d0ee1f1621dd6fc0452d26ffcb65c30a95f

      SHA256

      c66dedc708c1ff94b16c46951570887f528e542bbb3e5574ba314fbb736a9cb4

      SHA512

      15fb3eb080e91284709d759b9b051051f64f47850b2a108d7c8f9b334237a630573c5c96eaee2a70b635ce74eabeb46c53178f1986e985819140d8fe88b3f143

    • \Users\Admin\AppData\Local\Temp\nsdD27D.tmp\g\gtapi_signed.dll

      Filesize

      71KB

      MD5

      61bc40d1fad9e0faa9a07219b90ba0e4

      SHA1

      5b5c3badedba915707000d2047eaf13f27b8925e

      SHA256

      89e157a4f61d7d18180cb7f901c0095da3b7a5cc5a9fd58d710099e5f0ee505a

      SHA512

      fa341aa975c471082b4b6c380f794d1e9ab3939382972cfb9e1dbb3491f68296ad1cedc8f03736921c8e133f62432997de29642e223c2a97f1cab5ce91d68af9

    • \Users\Admin\AppData\Local\Temp\nsdD27D.tmp\nsDialogs.dll

      Filesize

      9KB

      MD5

      c10e04dd4ad4277d5adc951bb331c777

      SHA1

      b1e30808198a3ae6d6d1cca62df8893dc2a7ad43

      SHA256

      e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a

      SHA512

      853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e

    • \Users\Admin\AppData\Local\Temp\nstC5C1.tmp\LangDLL.dll

      Filesize

      5KB

      MD5

      9384f4007c492d4fa040924f31c00166

      SHA1

      aba37faef30d7c445584c688a0b5638f5db31c7b

      SHA256

      60a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5

      SHA512

      68f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf

    • \Users\Admin\AppData\Local\Temp\nstC5C1.tmp\System.dll

      Filesize

      11KB

      MD5

      c17103ae9072a06da581dec998343fc1

      SHA1

      b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

      SHA256

      dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

      SHA512

      d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

    • \Users\Admin\AppData\Local\Temp\nstC5C1.tmp\UserInfo.dll

      Filesize

      4KB

      MD5

      7579ade7ae1747a31960a228ce02e666

      SHA1

      8ec8571a296737e819dcf86353a43fcf8ec63351

      SHA256

      564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

      SHA512

      a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

    • \Users\Admin\AppData\Roaming\Windupdt\winupdate.exe

      Filesize

      5.0MB

      MD5

      99d2656e3599ba235242dc9763b3940b

      SHA1

      2ac901d260222eed2c8d7f1cdc92ae8d11b50c7b

      SHA256

      bb14ef332f01f1db8ce7a225adc9fe5f6ee5c4a6ffd2038478065e270080abad

      SHA512

      af8c8fd9e842ad21feb9da2c06637dc484927714a7c562f2916e1fe4f349bf2a12fd513e750440a02280ee773a8bcaf9df0f97dba5b8cbc7d81c521adee78ce3

    • memory/1972-63-0x00000000763E0000-0x00000000764F0000-memory.dmp

      Filesize

      1.1MB

    • memory/1972-22-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-30-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-40-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-39-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-37-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-36-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-35-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-34-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-33-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-32-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-31-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-29-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-28-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-27-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-26-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-25-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-24-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-23-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-13-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-21-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-20-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-17-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-45-0x00000000763E0000-0x00000000764F0000-memory.dmp

      Filesize

      1.1MB

    • memory/1972-51-0x00000000763E0000-0x00000000764F0000-memory.dmp

      Filesize

      1.1MB

    • memory/1972-50-0x00000000763E0000-0x00000000764F0000-memory.dmp

      Filesize

      1.1MB

    • memory/1972-54-0x00000000763E0000-0x00000000764F0000-memory.dmp

      Filesize

      1.1MB

    • memory/1972-9-0x00000000763F4000-0x00000000763F5000-memory.dmp

      Filesize

      4KB

    • memory/1972-61-0x00000000763E0000-0x00000000764F0000-memory.dmp

      Filesize

      1.1MB

    • memory/1972-60-0x00000000763E0000-0x00000000764F0000-memory.dmp

      Filesize

      1.1MB

    • memory/1972-10-0x00000000763E0000-0x00000000764F0000-memory.dmp

      Filesize

      1.1MB

    • memory/1972-0-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-19-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-11-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-12-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-18-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-38-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-14-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-16-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/1972-15-0x00000000003B0000-0x00000000003D0000-memory.dmp

      Filesize

      128KB

    • memory/2236-129-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-126-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-137-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-109-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-138-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-136-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-135-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-134-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-133-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-132-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-131-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-130-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-118-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-128-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-127-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-119-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-125-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-124-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-123-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-122-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-121-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2236-120-0x0000000000290000-0x00000000002B0000-memory.dmp

      Filesize

      128KB

    • memory/2828-105-0x00000000763E0000-0x00000000764F0000-memory.dmp

      Filesize

      1.1MB

    • memory/2828-66-0x0000000000400000-0x00000000007A1000-memory.dmp

      Filesize

      3.6MB

    • memory/2828-101-0x0000000000400000-0x00000000007A1000-memory.dmp

      Filesize

      3.6MB

    • memory/2828-67-0x00000000763E0000-0x00000000764F0000-memory.dmp

      Filesize

      1.1MB

    • memory/2828-64-0x0000000000400000-0x00000000007A1000-memory.dmp

      Filesize

      3.6MB

    • memory/2828-65-0x00000000763E0000-0x00000000764F0000-memory.dmp

      Filesize

      1.1MB

    • memory/2828-62-0x0000000000400000-0x00000000007A1000-memory.dmp

      Filesize

      3.6MB

    • memory/2828-59-0x0000000000400000-0x00000000007A1000-memory.dmp

      Filesize

      3.6MB