Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-12-2024 03:07

General

  • Target

    dcbb6cc58824f44953cca1d144e82a81_JaffaCakes118.exe

  • Size

    758KB

  • MD5

    dcbb6cc58824f44953cca1d144e82a81

  • SHA1

    2a99a14086d196ca3181a2f9e35a3e7d7573daaa

  • SHA256

    4425a0f5f1477aeb078c2804585fbf3b4fcebdf4b04c9cd1d4180360292dd074

  • SHA512

    78875f13664ab95bb2fbb7ca830e3821eb49cabc7c36d39a648c792be53859066f6c9ddf9735c76096d33c39c2154fd8b28dd21e88852e9c3ebe6820e376e2eb

  • SSDEEP

    12288:BXhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy452Uo:NnAw2WWeFcfbP9VPSPMTSPL/rWvzq4JY

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

41.201.107.142:1604

Mutex

DC_MUTEX-ZTGW4GN

Attributes
  • gencode

    RJwY9vmQBcWc

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Drops file in Drivers directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcbb6cc58824f44953cca1d144e82a81_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dcbb6cc58824f44953cca1d144e82a81_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2180-1-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2180-2-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2180-4-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB