Analysis

  • max time kernel
    148s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 04:40

General

  • Target

    fe7970e2544e76469e920ed0b4c46e0f_JaffaCakes118.exe

  • Size

    5.3MB

  • MD5

    fe7970e2544e76469e920ed0b4c46e0f

  • SHA1

    8c7c70fa2b1fe29d4ff2b85189f43c16b8cccb2e

  • SHA256

    dc3f0f158fe35f749b506e7f1e25a7506eab5a72ca2975cec089657447f6aabb

  • SHA512

    0b2bf9e39172642e5c7e62cf14126b8595157140b9087000d1fd78a43ba13cc026154b15e94e566d7ce0bb3166aa08093887f9588daa869cf49d862d6ec8fca1

  • SSDEEP

    98304:/yo366ucUwk7AMbpnuFCxPl/lNU3cJnbhDNvQKyiVLLHkVVvZMa8PB:qGkHoSlNNUy9NoKycszi

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe7970e2544e76469e920ed0b4c46e0f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fe7970e2544e76469e920ed0b4c46e0f_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3228
    • C:\Users\Admin\AppData\Local\Temp\d.exe
      "C:\Users\Admin\AppData\Local\Temp\d.exe"
      2⤵
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\YA_SABRK.MP3"
        3⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:2080
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2f4 0x508
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\YA_SABRK.MP3

    Filesize

    4.5MB

    MD5

    1a799ad4f3df77258e43a13d7226b8f7

    SHA1

    66248960bdd9c4e71c6a2f80ebce31974e87d0b9

    SHA256

    054ba28149f684238807e90c32c59fb3ba0c38688c1bb99241df2238b12e8b88

    SHA512

    5ae8b1f6bbf66d9266cfa7da809e8a2f6d971bcd8f1ccea279597fa1b28c9f07ae2a572b7fb7d6105eb51e7a1c3e01be2ceb4af6099eb8e197d52928dd3c733b

  • C:\Users\Admin\AppData\Local\Temp\d.exe

    Filesize

    5.2MB

    MD5

    abbb51d0411024c3fcb0e5368ae8ce3b

    SHA1

    31b0877459c62b5702856f180bec9f6257b16d27

    SHA256

    99ef0b0a9c9e51ab8f52fb88ef6b4aa83135a1c325fbaeaa919ab8f36d3ee0ec

    SHA512

    1a57221773a0e2bcd2f1ed66348e472588e1c8e7191da855a538e696eb116d6ce6dd1b9d82c7301091ecf9826a0c3ad8cc88ab572af5b838c38757d0bc34c1eb

  • memory/2080-28-0x00007FFC700C0000-0x00007FFC700D7000-memory.dmp

    Filesize

    92KB

  • memory/2080-37-0x00007FFC60710000-0x00007FFC60731000-memory.dmp

    Filesize

    132KB

  • memory/2080-27-0x00007FFC70BA0000-0x00007FFC70BB8000-memory.dmp

    Filesize

    96KB

  • memory/2080-42-0x00007FFC5E850000-0x00007FFC5E862000-memory.dmp

    Filesize

    72KB

  • memory/2080-25-0x00007FFC70BC0000-0x00007FFC70BF4000-memory.dmp

    Filesize

    208KB

  • memory/2080-33-0x00007FFC68500000-0x00007FFC68511000-memory.dmp

    Filesize

    68KB

  • memory/2080-32-0x00007FFC68520000-0x00007FFC6853D000-memory.dmp

    Filesize

    116KB

  • memory/2080-26-0x00007FFC62200000-0x00007FFC624B6000-memory.dmp

    Filesize

    2.7MB

  • memory/2080-31-0x00007FFC68540000-0x00007FFC68551000-memory.dmp

    Filesize

    68KB

  • memory/2080-34-0x00007FFC61C40000-0x00007FFC61E4B000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-30-0x00007FFC68560000-0x00007FFC68577000-memory.dmp

    Filesize

    92KB

  • memory/2080-29-0x00007FFC6D270000-0x00007FFC6D281000-memory.dmp

    Filesize

    68KB

  • memory/2080-55-0x00007FFC60860000-0x00007FFC61910000-memory.dmp

    Filesize

    16.7MB

  • memory/2080-35-0x00007FFC60860000-0x00007FFC61910000-memory.dmp

    Filesize

    16.7MB

  • memory/2080-24-0x00007FF7C88E0000-0x00007FF7C89D8000-memory.dmp

    Filesize

    992KB

  • memory/2080-41-0x00007FFC606B0000-0x00007FFC606C1000-memory.dmp

    Filesize

    68KB

  • memory/2080-40-0x00007FFC606D0000-0x00007FFC606E1000-memory.dmp

    Filesize

    68KB

  • memory/2080-39-0x00007FFC606F0000-0x00007FFC60701000-memory.dmp

    Filesize

    68KB

  • memory/2080-38-0x00007FFC62C10000-0x00007FFC62C28000-memory.dmp

    Filesize

    96KB

  • memory/2080-36-0x00007FFC60740000-0x00007FFC60781000-memory.dmp

    Filesize

    260KB

  • memory/2648-9-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

    Filesize

    4KB

  • memory/2648-23-0x0000000000400000-0x0000000000949000-memory.dmp

    Filesize

    5.3MB

  • memory/2648-43-0x0000000000400000-0x0000000000949000-memory.dmp

    Filesize

    5.3MB

  • memory/2648-83-0x0000000000400000-0x0000000000949000-memory.dmp

    Filesize

    5.3MB

  • memory/2648-63-0x0000000000400000-0x0000000000949000-memory.dmp

    Filesize

    5.3MB

  • memory/3228-8-0x0000000000400000-0x0000000000955000-memory.dmp

    Filesize

    5.3MB