Resubmissions

10-12-2024 23:00

241210-2y3qaatmcz 10

Analysis

  • max time kernel
    25s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    10-12-2024 23:00

General

  • Target

    dedd075c79305e69cf9cec3c757ecd89_JaffaCakes118.exe

  • Size

    532KB

  • MD5

    dedd075c79305e69cf9cec3c757ecd89

  • SHA1

    1e39c5446aa23168c8a549907a237c1cbf246f21

  • SHA256

    bca9c9b7d76727bc66cdccd93d506b11f8784e1ffa38b1b124a4c25f75aa7b3d

  • SHA512

    193dbb20c33eccaa76dcd8a501034c16e81a78e3fa260834085bf871e86fb79cbe68e756d1783ececef903f21bcc32d74d2889da3b4a3ff848e7a1f69b147c98

  • SSDEEP

    12288:yboBeI1XTheTFJubyk2CK9oi/HwxH+iey27nCz:1kIthKrutMb/HtieB

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dedd075c79305e69cf9cec3c757ecd89_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dedd075c79305e69cf9cec3c757ecd89_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Users\Admin\AppData\Local\Temp\dedd075c79305e69cf9cec3c757ecd89_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\dedd075c79305e69cf9cec3c757ecd89_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3216
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\VIMIG.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3372
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "salvia" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Bingo\svchosh.exe" /f
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:3424
      • C:\Users\Admin\AppData\Roaming\Bingo\svchosh.exe
        "C:\Users\Admin\AppData\Roaming\Bingo\svchosh.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3448
        • C:\Users\Admin\AppData\Roaming\Bingo\svchosh.exe
          "C:\Users\Admin\AppData\Roaming\Bingo\svchosh.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:872
        • C:\Users\Admin\AppData\Roaming\Bingo\svchosh.exe
          "C:\Users\Admin\AppData\Roaming\Bingo\svchosh.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\VIMIG.bat

    Filesize

    141B

    MD5

    50e2930e5364be50ded453c36cf8dc0c

    SHA1

    5a6fbcea7a0b92a45b5b6ce7dea636105cffb281

    SHA256

    12e43e4d68acf87c9ab972b889ce0902c06651b227e2ef374c68876644f018fd

    SHA512

    cf1320bb060d103a0b518cef8fbd06d8ea7f175349c267b42933c5637faaae2b48c573139b115ad44dadda28e8f61db72df9a55d426462175b167076e78aa087

  • \Users\Admin\AppData\Roaming\Bingo\svchosh.exe

    Filesize

    532KB

    MD5

    1b3bfa4a745aea2581f3489a61a19520

    SHA1

    2411051ec9190dd86714e1e2d47353037029828c

    SHA256

    f7b9e230cfe70d223dc553df7d55556abdf88a8f7a8394e6ecc44f3a0482f56e

    SHA512

    1791a5a8a8023003f680b2bd230b10d4c9fc1aec47128f3ff05ddf677364c4dda6f84388d029ce44be16945a3d447741a4d514dab7a1b3c0b4298d4bea78a565

  • memory/872-1035-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/872-886-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1488-105-0x00000000030E0000-0x00000000030E1000-memory.dmp

    Filesize

    4KB

  • memory/1488-8-0x0000000002BD0000-0x0000000002BD1000-memory.dmp

    Filesize

    4KB

  • memory/1488-18-0x0000000002D30000-0x0000000002D31000-memory.dmp

    Filesize

    4KB

  • memory/1488-90-0x0000000002B70000-0x0000000002B71000-memory.dmp

    Filesize

    4KB

  • memory/1488-22-0x0000000002F30000-0x0000000002F31000-memory.dmp

    Filesize

    4KB

  • memory/1488-24-0x0000000002F30000-0x0000000002F31000-memory.dmp

    Filesize

    4KB

  • memory/1488-36-0x0000000002E90000-0x0000000002E91000-memory.dmp

    Filesize

    4KB

  • memory/1488-80-0x0000000002E80000-0x0000000002E81000-memory.dmp

    Filesize

    4KB

  • memory/1488-160-0x0000000000370000-0x0000000000371000-memory.dmp

    Filesize

    4KB

  • memory/1488-157-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/1488-152-0x0000000002E10000-0x0000000002E11000-memory.dmp

    Filesize

    4KB

  • memory/1488-146-0x00000000030D0000-0x00000000030D1000-memory.dmp

    Filesize

    4KB

  • memory/1488-138-0x00000000004F0000-0x00000000004F1000-memory.dmp

    Filesize

    4KB

  • memory/1488-135-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/1488-123-0x0000000002E20000-0x0000000002E21000-memory.dmp

    Filesize

    4KB

  • memory/1488-113-0x0000000002CB0000-0x0000000002CB1000-memory.dmp

    Filesize

    4KB

  • memory/1488-4-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/1488-102-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/1488-20-0x0000000002D30000-0x0000000002D31000-memory.dmp

    Filesize

    4KB

  • memory/1488-14-0x0000000002B80000-0x0000000002B81000-memory.dmp

    Filesize

    4KB

  • memory/1488-62-0x0000000002480000-0x0000000002481000-memory.dmp

    Filesize

    4KB

  • memory/1488-72-0x0000000003300000-0x0000000003301000-memory.dmp

    Filesize

    4KB

  • memory/1488-60-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/1488-52-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1488-44-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1488-34-0x0000000002E90000-0x0000000002E91000-memory.dmp

    Filesize

    4KB

  • memory/1488-32-0x0000000002CE0000-0x0000000002CE1000-memory.dmp

    Filesize

    4KB

  • memory/1488-30-0x0000000002CE0000-0x0000000002CE1000-memory.dmp

    Filesize

    4KB

  • memory/1488-28-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/1488-26-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/1488-12-0x0000000002B80000-0x0000000002B81000-memory.dmp

    Filesize

    4KB

  • memory/1488-2-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/1488-6-0x0000000002BD0000-0x0000000002BD1000-memory.dmp

    Filesize

    4KB

  • memory/3168-1026-0x0000000000400000-0x00000000004C9000-memory.dmp

    Filesize

    804KB

  • memory/3168-1038-0x0000000000400000-0x00000000004C9000-memory.dmp

    Filesize

    804KB

  • memory/3216-1029-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3216-446-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB