Analysis

  • max time kernel
    21s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/12/2024, 08:08

General

  • Target

    edd208266996315d13f856cefa16f618_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    edd208266996315d13f856cefa16f618

  • SHA1

    2332ed2cbf8ce901a2c60753ed865648d3bc52e4

  • SHA256

    5784171950f575de39154842ebd9d4a187647eaa5cb84a590a833b9b784f2a7a

  • SHA512

    b8f5258f7517d9ab775fe80189e708555e76795b781cb7b8878bb85b4183227354a1650ddffbb599932b58e824f7e73e3b01aac0c5698c8f913cd4531abb58b8

  • SSDEEP

    24576:20oL/rruzqNu/GtCbBXieusDd/ViKVhlGN:20eRNyGtKvddKN

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 8 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edd208266996315d13f856cefa16f618_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\edd208266996315d13f856cefa16f618_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Users\Admin\AppData\Local\Temp\ÜÖÈáÕ.exe
      "C:\Users\Admin\AppData\Local\Temp\ÜÖÈáÕ.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Users\Admin\AppData\Local\Temp\winhost.exe
        C:\Users\Admin\AppData\Local\Temp\winhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2440
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          4⤵
            PID:1632
      • C:\Users\Admin\AppData\Local\Temp\ùËØ.exe
        "C:\Users\Admin\AppData\Local\Temp\ùËØ.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1304
        • C:\Users\Admin\AppData\Local\Temp\ÃüîÈû.exe
          "C:\Users\Admin\AppData\Local\Temp\ÃüîÈû.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2084
          • C:\Users\Admin\AppData\Local\Temp\winhost.exe
            C:\Users\Admin\AppData\Local\Temp\winhost.exe
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2156

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\winhost.exe

      Filesize

      31KB

      MD5

      ed797d8dc2c92401985d162e42ffa450

      SHA1

      0f02fc517c7facc4baefde4fe9467fb6488ebabe

      SHA256

      b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e

      SHA512

      e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2

    • C:\Users\Admin\AppData\Local\Temp\ÃüîÈû.exe

      Filesize

      312KB

      MD5

      0524143dec1b7953881185f5b5b35369

      SHA1

      1010cfa7130bd2704e8903290b4fccdea563f40a

      SHA256

      b9b0066442c43372d84c9b3de7c5a8a36235c4a51847a2ae6510dcb16151f1f5

      SHA512

      3736332bf079b206442b472ec2349ff5d7486b883e76f688d0474bfa4a46f4f9601de93ca3dec9fe43147ccd7cf8563956e1e66bc42bd4bcc690bffa02e14b93

    • C:\Users\Admin\AppData\Local\Temp\ùËØ.exe

      Filesize

      328KB

      MD5

      cb666a59d291046ad30beb27dfd9d0db

      SHA1

      564b102a59df93966514410aaa29dd3101ff75f5

      SHA256

      ba7f840926e490fa1bbab549345931a9931e39a3e65c26b8c3374caf986981b8

      SHA512

      aa32deee388ff71550ac5eb781cd8a8afb882fd053f57b7f3dc4a936344e708546dc6434f3e3029e9c0e91bacbf9c4f076c24e0316a752557ae1bfb563f0d924

    • \Users\Admin\AppData\Local\Temp\ÜÖÈáÕ.exe

      Filesize

      516KB

      MD5

      2eca5a5480b4732630a93ed6ff52976a

      SHA1

      12d2755ab1147c4101416f80a2600e360e07a0a9

      SHA256

      663293db91c2676aa69dc008427286fa383d9254233c3e63c4aa951f9e1f9c1b

      SHA512

      70dc0aab6df8c12c605913a745490cd6245ce9905083f5a5a4106f32f1aaa21667871aca1cf2e0ed78ac0708157ba5c685e6e7c5c7cdd9ca05f819c5c6f146a0

    • memory/1304-27-0x0000000074DE0000-0x000000007538B000-memory.dmp

      Filesize

      5.7MB

    • memory/1304-63-0x0000000074DE0000-0x000000007538B000-memory.dmp

      Filesize

      5.7MB

    • memory/1544-1-0x0000000074DE0000-0x000000007538B000-memory.dmp

      Filesize

      5.7MB

    • memory/1544-2-0x0000000074DE0000-0x000000007538B000-memory.dmp

      Filesize

      5.7MB

    • memory/1544-24-0x0000000074DE0000-0x000000007538B000-memory.dmp

      Filesize

      5.7MB

    • memory/1544-0-0x0000000074DE1000-0x0000000074DE2000-memory.dmp

      Filesize

      4KB

    • memory/1632-79-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2156-88-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/2156-76-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/2156-87-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/2156-77-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/2156-78-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/2156-89-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/2156-67-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/2156-69-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/2156-90-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/2156-86-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/2156-85-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/2156-84-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/2156-71-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/2440-48-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2440-44-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2440-32-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2440-34-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2440-36-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2440-38-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2440-40-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2440-49-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2440-42-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2440-62-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2440-80-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2440-46-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2516-64-0x0000000074DE0000-0x000000007538B000-memory.dmp

      Filesize

      5.7MB

    • memory/2516-13-0x0000000074DE0000-0x000000007538B000-memory.dmp

      Filesize

      5.7MB