Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 06:07

General

  • Target

    af5d0181fbeb90324537ded8e893c4b9_JaffaCakes118.exe

  • Size

    987KB

  • MD5

    af5d0181fbeb90324537ded8e893c4b9

  • SHA1

    278a04591af1247e7619a37afc8c7ec7f5821866

  • SHA256

    195fa3d7078b6a501af6ac1316dcffb4e02e58b864ff5b6f18ca5849dc586f2a

  • SHA512

    83a6e0d0ade376d5fc6230bdd4e873a9a35c21570ac0a75e68896a421cbac17a4db4c44f0d9a2f17045fa1313551e88f3089abf9c09b9716afacb6694241cbcb

  • SSDEEP

    24576:IeZaxci99NY+ueca57Y95pj11x8jSpQIeBho:l0xci9jrFp6j1wepZeBho

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Themida packer 40 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1236
      • C:\Users\Admin\AppData\Local\Temp\af5d0181fbeb90324537ded8e893c4b9_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\af5d0181fbeb90324537ded8e893c4b9_JaffaCakes118.exe"
        2⤵
        • Modifies WinLogon for persistence
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Users\Admin\AppData\Local\Temp\HACK COINS SMEET.EXE
          "C:\Users\Admin\AppData\Local\Temp\HACK COINS SMEET.EXE"
          3⤵
          • Executes dropped EXE
          PID:2840
        • C:\Users\Admin\AppData\Local\Temp\SERVER.EXE
          "C:\Users\Admin\AppData\Local\Temp\SERVER.EXE"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2864
        • C:\Windows\SysWOW64\explorer.exe
          "C:\Windows\SysWOW64\explorer.exe"
          3⤵
          • Checks BIOS information in registry
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2580

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\SERVER.EXE

      Filesize

      56KB

      MD5

      7235bd5942861bb7a37c0a7862312b27

      SHA1

      f9642566293cfc1cac416914c5c3ef73b7837926

      SHA256

      b45af70c4e3fe47689239811f357f79945b842c525b5721a3cfba73a458c9f08

      SHA512

      c141bc24cd09450c8994b2cb3a652ce5c175b8a74ec59dac214cbcc5a4c4f0b82cb0a73bb76c77fa89b4e0408848ed66c5303748d199b5cc764601dfb2423c28

    • \Users\Admin\AppData\Local\Temp\HACK COINS SMEET.EXE

      Filesize

      37KB

      MD5

      3a53ffbb8f1916ec41d52ecc7c6f6353

      SHA1

      450df4cca6ca3eddcf8ef1685763c7bd2a0b3677

      SHA256

      9cf52c6234fd8888eaf13ebcc94f2c18ad059b142849ea443dd7076f4c10e9e7

      SHA512

      2592c88a27a8e119331b0a5284b9368175e56bd5ce32f05cbf1985d374ca970d6a1ceff15746b3a105b9b00520011025c917f621448317a815b3856158ba4cd4

    • memory/1236-75-0x000000007EFD0000-0x000000007EFD1000-memory.dmp

      Filesize

      4KB

    • memory/1236-72-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/2580-57-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-69-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-44-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-68-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-43-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-67-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-66-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-65-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-64-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-63-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-62-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-55-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-31-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-37-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-56-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-34-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-33-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2580-54-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-53-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-52-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-51-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-50-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-49-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-48-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-45-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-46-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-47-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-58-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-59-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-42-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-41-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-40-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-39-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-38-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-61-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2580-60-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2732-1-0x0000000000401000-0x000000000044C000-memory.dmp

      Filesize

      300KB

    • memory/2732-25-0x0000000005FD0000-0x0000000005FD9000-memory.dmp

      Filesize

      36KB

    • memory/2732-13-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2732-36-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2732-0-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2732-26-0x0000000004590000-0x0000000004591000-memory.dmp

      Filesize

      4KB

    • memory/2732-27-0x0000000004670000-0x0000000004671000-memory.dmp

      Filesize

      4KB

    • memory/2732-28-0x0000000004660000-0x0000000004661000-memory.dmp

      Filesize

      4KB

    • memory/2732-21-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2732-29-0x0000000005FD0000-0x0000000005FD9000-memory.dmp

      Filesize

      36KB

    • memory/2732-5-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2732-6-0x0000000000400000-0x0000000000624000-memory.dmp

      Filesize

      2.1MB

    • memory/2840-24-0x000007FEF602E000-0x000007FEF602F000-memory.dmp

      Filesize

      4KB

    • memory/2840-85-0x0000000000AC0000-0x0000000000B40000-memory.dmp

      Filesize

      512KB

    • memory/2840-23-0x0000000000AC0000-0x0000000000B40000-memory.dmp

      Filesize

      512KB

    • memory/2864-30-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2864-84-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB