Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2024 01:35

General

  • Target

    d00c31822087142a7addaf6051bd0812_JaffaCakes118.exe

  • Size

    449KB

  • MD5

    d00c31822087142a7addaf6051bd0812

  • SHA1

    c02363c122ea1a2dc1a6a48037ec7d06f3908caf

  • SHA256

    0eb05ea65682f093007fd38a0bfa99b66a3a059b54dbb8a1ce4bae7c0d890059

  • SHA512

    86152091d1df0a12c906a5f4cdb9e1e1d8f8762ec77fc4136fffadc338d0f6d5009d7c9da317cba62f161d928c61d26d155e1a1ee53ca9fb598a457743e157b6

  • SSDEEP

    12288:pVTHy8bZiuDS925JNwbdM9VQasIwe3/Sckv9Yf:phtbgr925J2baQahVMFYf

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d00c31822087142a7addaf6051bd0812_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d00c31822087142a7addaf6051bd0812_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Users\Admin\AppData\Local\Temp\splash.exe
      "C:\Users\Admin\AppData\Local\Temp\splash.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3804
      • C:\Users\Admin\AppData\Roaming\Windupdt\winupdate.exe
        "C:\Users\Admin\AppData\Roaming\Windupdt\winupdate.exe"
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:1340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\splash.exe

    Filesize

    276KB

    MD5

    8ba1a492c6bf52df90cd908fbaca88ba

    SHA1

    3df03cf51ed0f09dabb77ed8dda9be7c687d6e7f

    SHA256

    b81048c7c949e1f453f20ab5d0d58cafa48b98b91d2f7a4ee92aff4af655eeab

    SHA512

    70053dd61676672ec49602d74ee82e0b6f01e2f024015a3618c516a36efeddd71f6a1827715dd1fdd3c0f307a4f528570d4d63571de0d10e664f71e96428107b

  • memory/1340-52-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/1340-61-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/1340-51-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/1340-46-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/1340-47-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/1340-48-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/1340-49-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/1340-50-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/1340-60-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/1340-59-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/1340-54-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/1340-53-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/1340-55-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/1340-56-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/1340-57-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/1340-58-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/3804-10-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/3804-45-0x0000000000400000-0x00000000004CAE40-memory.dmp

    Filesize

    811KB

  • memory/3804-9-0x0000000000400000-0x0000000000401000-memory.dmp

    Filesize

    4KB