Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-01-2025 12:01

General

  • Target

    JaffaCakes118_64eff4f0e19acf9ccf8cdd9d672af690.exe

  • Size

    715KB

  • MD5

    64eff4f0e19acf9ccf8cdd9d672af690

  • SHA1

    617bc8febea4370ec4b7123191b275fb01c3ea57

  • SHA256

    32cd6293bb07914f054fc76511c60a647fb1ccfdd6e1dddcc1a68a2a842a9c3a

  • SHA512

    43f67518e9f1adc7c1923f5ce99722b62f4118d35705ee740a14b97e4d782332e3154fb0fd61e7b9659d92840bad5941a204c72fa3e2512b7711f5ee6131a174

  • SSDEEP

    12288:tRnfZLsRTMgxjVlbOihYaamOqGPfw0C5dqsUu5eR57qVe3s:ffNIT1lbxhYXmGVqlP4ye3s

Malware Config

Extracted

Family

darkcomet

Botnet

New

C2

zw4lcfe.no-ip.biz:36050

Mutex

DC_MUTEX-G4MYDUH

Attributes
  • gencode

    UAAq4f17b6ky

  • install

    false

  • offline_keylogger

    true

  • password

    -RandomPassword0000-

  • persistence

    false

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64eff4f0e19acf9ccf8cdd9d672af690.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64eff4f0e19acf9ccf8cdd9d672af690.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yibe89-a.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA548.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc5FCE433B1CD04754B13E4E4A2F3E9ED8.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4664
    • C:\Users\Admin\AppData\Local\Temp\AppLaunch\svhst.exe
      C:\Users\Admin\AppData\Local\Temp\\AppLaunch\svhst.exe
      2⤵
      • Modifies firewall policy service
      • Modifies security service
      • Windows security bypass
      • Executes dropped EXE
      • Windows security modification
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AppLaunch\svhst.exe

    Filesize

    1.1MB

    MD5

    d881de17aa8f2e2c08cbb7b265f928f9

    SHA1

    08936aebc87decf0af6e8eada191062b5e65ac2a

    SHA256

    b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

    SHA512

    5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

  • C:\Users\Admin\AppData\Local\Temp\RESA548.tmp

    Filesize

    1KB

    MD5

    84c8532e0595de504dde6c827d62414b

    SHA1

    9d0646ae576f50142eace48ae98ec4b0ae3cfd06

    SHA256

    661835618b6ee5291cc64b6315486e9981e05a4e20361eb89ae73d9d58bf35b4

    SHA512

    7af39d393566007f58add4a6c9a27a2dd2c0ebe100c9b5954b47ad37970add8b62bbfa7f8fed4773bfc353773d1c6038958620a52e721741a889cba4655c94d8

  • C:\Users\Admin\AppData\Local\Temp\vbc5FCE433B1CD04754B13E4E4A2F3E9ED8.TMP

    Filesize

    652B

    MD5

    a8291b569273199ffc3a222b36ea1e0b

    SHA1

    63ab18aa2523fe29e8aae98fc5ce89b66f50c992

    SHA256

    d2a497c8a6a9452efd428cdb251a5c204d470c12ba67b8ef7ca895b02a4f28da

    SHA512

    55fbaf3320bf4e1e4dea94d0e132af82d938908476928320bba05e079a686c91134a40a2998d3f6259f331c98f633260b198c59f2e55d1d2c7aae78ee9440bb8

  • C:\Users\Admin\AppData\Local\Temp\yibe89-a.0.vb

    Filesize

    1KB

    MD5

    73063624452d1f57340417b1db497881

    SHA1

    106cf3f4d0615feee26587652b52292177f9a516

    SHA256

    fffb0516398c7283d0ce4c614c84bad3b5730771b323928dbc66171090f92bc7

    SHA512

    47fe84fa9df2c8ee2b6057f596afff7b80d6f31902f82944b9e984658d15e8028d260d58830a1c14555008d48a67d695e7aaf555834a52827ac15c3a559c8d3d

  • C:\Users\Admin\AppData\Local\Temp\yibe89-a.cmdline

    Filesize

    168B

    MD5

    e703a79240463c7f48ea2c3ab155200d

    SHA1

    f9d7a4afc24346cbdecc9d4f624ab03f0eda5bd4

    SHA256

    3adbfe7152bee963a25eb50620cb471306ccb165e2bbe6a18318a534a0052d45

    SHA512

    62b26485accedf1ada5a91f9290623c2fd18811cdd8901b2973d8c10acacf2a1f99d9bcc3cceba9f8809697d4165f72ea2e9eded6d7aae1db300106dd086a6bc

  • C:\Users\Admin\AppData\Local\Temp\yibe89-a.dll

    Filesize

    7KB

    MD5

    940ea25a7af0fc5246f2c1f2dc44d327

    SHA1

    466e43a11275c7c360759f2e59b79f0d6b67dede

    SHA256

    a6262d8de6c3ba927500a57a22a13f6b86a05f98a51935502b7715addb1ace53

    SHA512

    a7b045753fd12b90695be7fd5f7c0b0224d29c7d4ef487b399fc79db4c12941debc168cf589a3e6a44e7fc037c3ef4f08ff05a7a32255b714dc141f8cbb6aa49

  • memory/972-7-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB

  • memory/972-0-0x0000000074962000-0x0000000074963000-memory.dmp

    Filesize

    4KB

  • memory/972-5-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB

  • memory/972-43-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB

  • memory/972-2-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB

  • memory/972-42-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB

  • memory/972-1-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB

  • memory/972-41-0x0000000074962000-0x0000000074963000-memory.dmp

    Filesize

    4KB

  • memory/2388-39-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-47-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-38-0x0000000000680000-0x0000000000681000-memory.dmp

    Filesize

    4KB

  • memory/2388-40-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-35-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-34-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-31-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-58-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-57-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-45-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-46-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-37-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-48-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-49-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-50-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-51-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-52-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-53-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-54-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-55-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2388-56-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2484-44-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB

  • memory/2484-14-0x0000000074960000-0x0000000074F11000-memory.dmp

    Filesize

    5.7MB