Analysis

  • max time kernel
    122s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-01-2025 12:38

General

  • Target

    JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe

  • Size

    724KB

  • MD5

    6cae0061a202f9a84975872c387eded8

  • SHA1

    3282ef9ae0c219e7a9edc992d68f3be1077ad826

  • SHA256

    7736e50e548acb5f83a16782393ddd17489c55162d4b81aa8c9c5d2356e04574

  • SHA512

    b8a7ff5fa90718d5650eaba6da7b58ba1beba112814658ae93a8eac89eb0f048be60d71cc6ab8d1011be71c5d1ac01a60d68711f6bb01b1961fb879de275825e

  • SSDEEP

    12288:oZCQ3Fdf7REeahTfqWfr39INldD2uQxc4n4eWRBhtJ6kIJnkEzJLmYJYSc:oZCQ3/7qnJSE3iXzAccWTnJ9ynkEzJqg

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d7a0a95c73c190f3efc0c830340c7a9

    SHA1

    a4a202f6ebad255b9fda295afb3829260f77867c

    SHA256

    00e97b5eaecf7a825115a9ad6e8567f2946bad108b6e1388375e422f1d5b8d78

    SHA512

    13bf2c2f71269102b3fc5983579b045798cc3f4e4645bc573a92839b69f4ea79dc2b959bcd4eeb1f396b2dcbe8134087a3897bbdc94b8840b792f429ef1eec2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87a05b95db8eff7523752f4c638f5024

    SHA1

    a7fb7b30b1e35a9e67dbef2ba0ca1b8b64a78403

    SHA256

    76636a82abe6c225b52e7676a7285c81a23df27a415418e55d1f77c40ab09312

    SHA512

    e8853cc624a261b09ca6cac5a772401c706bc5b30746fbf1e87fb3db8256fc29397da7afa7d6b9259de3d18d01ebab5d03e2e2ba52561cb320a5d731df2a6c3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    220513be9806c4adf615b9222dadf7d0

    SHA1

    36c97e5c99497050242b45444413c46966fc50f9

    SHA256

    66e1df6367d4fbdb45d514516dff47651e79033c17fe3334709d3eb90c430496

    SHA512

    b7e597ec1a257e483668a63006f566d992397be888c857d70e9b769f84a1905cf0c7f6f133749f712678de20b65a444e07bfc15435cd0144169c29d36c68fee0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    943adb455b24290ed0be701c30ed9564

    SHA1

    02b229c012658c491abae41768d6b174e915d3f0

    SHA256

    1ec8cfb99fc693d864cfc2923b75f9bf4af892aee24af79e5b246eb0d9b01593

    SHA512

    c84cea513b4fab1cc01be9b81c5314c961c62dc524e229e01e7e941dd27bf174da8d6c900f2ade6187df0d25f6a17becad3f73e0f6d2991bf211da3ae8763dd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9813070217934dd950a3c6be51483b8f

    SHA1

    d95d3614b781b2357de52effaabf640917d28032

    SHA256

    b2bfb4aa62b6445ad3a9a0a5d5fd24fc98fd88e24966c17a0b0f39dc997e2fb8

    SHA512

    87e87e30ac59d201fc6003910af5cb8d648dbdd12a5a4eba017f3ce1fa77c08c98fd664c06fca6d66b505771a862ba26fb74a04cc32f22daa42cead7e5f8e1ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    819391151f66ea2f42b38dec11bc2513

    SHA1

    d11cd65678e6346daa239c0d07c15b8b5a208e1e

    SHA256

    ed1e72de3696a0a97fc73bb6be2dae4bc977c5371d8edc8b3d96a1616d49501f

    SHA512

    9e74f221dda0cf5c726db717360372d2f9ebc9c4e7cda44202aac6e36f5efde919097e443485dc65faa594c9fdbf83390f56da1ff442f47071f022baee124106

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6d8f9fd921c9fe0ab9adf02bde81f29

    SHA1

    8c281003120b53b9649452acef9b633da7a76278

    SHA256

    93363dc5956224b2695d18a27982bff3baeb5210e25ee6f114ba36c1d1f8b582

    SHA512

    7b967cd823fa51de704bce54dbf541954e11b09e6a10778db2e7f177debfb066c494ff780f5390e719999261ce63d0b5227ce663a18718479b42b68daf4a585b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0326ac6bfbdba8203a03b61c316a7208

    SHA1

    950ee01582d19e4c4fb44cf785b3d52b5aa428ed

    SHA256

    f9e3c2fb73a79cac5156a56d711c9d7e9eb09d029ce69214bc3a584b3748e269

    SHA512

    53fbbeec093162ad8dcf36fac2dda8c9a2dc8e1421d2fdd275a627a31e3498ad876ab6929d2166dfea375996326a8e764e161d33f04b4644a8312bcd01307866

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f86d87481a5f0f69868d1f386120cc7f

    SHA1

    b538b6337a34d69e93e5b002c38730e8dc509ef5

    SHA256

    35ae355374abd7141980a4f5fa1dcec900670a0492645d1e45106799e0b7762f

    SHA512

    e74e82f3763f6fe2b8e2b4909af41008ac8b32f65a4e77761cd81d8f04f25d9c8aac2a7bd51ea949f8850187023f07dc8a7cb4b6a138b6ef74c35be2475636e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2445514bc970c1a6c97a21f1f8e63b38

    SHA1

    854cce348f7a63f0dc668b633b90785ae0658ac9

    SHA256

    8dd40f070ce5577fa16040a718f22c0b255c1f90dc07e36da16a172a90b1d8cf

    SHA512

    6748a0f5b129dae0e96644e52c6bab0276f3a051910fc11ea95d2d0a8880f7dcf58e0450f8b0f00313f6e5ed35b8affffd6d59bb07fb5864bfbaca4fc9e13152

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    516d085f7db7d84e82f9f70e6e8f3c8e

    SHA1

    e8ee8f365456f5c7a917b23da769aa45318adfcf

    SHA256

    9a9852f12744eaec5305fa04b8090bf56271c6ba73fc80f3f8a84ea6864ace1f

    SHA512

    7e33ae8807d327b7617a6e5793e1f48da72870f2dcc2810e87a5f82c4361f1f5484c950ed7533048eb31c5c5ea9f4cb5698f35c67208e75afb007d44983f5ed2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9cfc909a90f73a9dd8e2181e65a0c99

    SHA1

    89b91052a911f155755cd61f18d9825a8df0458b

    SHA256

    cde699e8cdae0deabab45ef0136546a28150d9981bb0eae79afef8ab41584ca7

    SHA512

    bc55f011344eb07554f99c56e7884996373a994bf332cd13f70310ac9a809c1811b5cbc013cb9d685290b63783b170bb60fa7d8ed0355399a522d65c234999f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5af3d1cf5efc3cf3cfca547a03254762

    SHA1

    6683758c2d635551683caabe6590115a2b8240c1

    SHA256

    5ccad19159eca5e200c8e2096977d5459669ab66103a82b767712d4b180d6f69

    SHA512

    c86900c6e05161aca865c8d502b6e4c46757fbed392ff893c657d3930ad087b758d309822692cbcc5637f7a206042c4d372b125e99c5c9fdbf3273b0e75d7eff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b273954557ae8eee3acbd9fb8e9859bc

    SHA1

    b4e813b8a12f0db7cbdd2ae0a42b4e9036b13047

    SHA256

    bd9e3aefd3c62d7cb4d8fe2b2ddb11d7fcda6e4192940c737fd8e62a870a39b0

    SHA512

    75405e72b281f79ff80080a9816fa9b8af7df2779670649dadf373e2978959f92f8132b92574856d031f233b63468df1b2cb13582431c6b91923828cee8b847c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc0c472019f10f9895fbd2f70b0a56eb

    SHA1

    16b784444a1fa170ea3bd2ee6f4c3b54edb19b70

    SHA256

    e474cc0cf310202fceaaa8d94a470efba75057e72c5c2f70e92333734edd10eb

    SHA512

    ea5facb2721fb9b681577ca6b2199c5e93cb1913d0b6d0f50914a1f3c2f434534b825cdf6df1bcefdefeec47364c64d03a5739fb1f5ceec09eb31b6799adee3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b56a985713f6677869e4b83ee98f00cf

    SHA1

    945ed588dc3c7a106894335b6ccdca0448572ddf

    SHA256

    13d0d47bdc1613f38cb9a90cd995207075e0816ea19cb915744324626849cd38

    SHA512

    035f095e989ed8e47b8b24f089ef78820087950979f9340b1e86621434488fb7aeb111668ce2ccf04bef4df94fda71b4031f3500e3a2b1f1bea9b27ee51b7f52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3144d1405ef84b1210ac63bb437f5d09

    SHA1

    b293bfe09688ab3bdf1181b41d4c6594edddf93c

    SHA256

    6d0765f978b5a42d0c10e91590c0515d7d09348b1586d332af9f1cc733037148

    SHA512

    448ed5eb3cc7fc2e356a92cac29b6d646f44b62a743bdec42f22b4fb5e6c9d44dcfce59dead36cfd3e4c741ec539720dfaef5b0a4286ea70eb008ffdde531bd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42b6ff1521c4285c2fb36bccb80a46e5

    SHA1

    31f7478b4520e81384bbb24ded47b04dbf89ac3d

    SHA256

    95505fc2b972438489aa26efa1975932a075158cc9493efb9911dff509d487c2

    SHA512

    d8750a307a74c94cb2fb93b751bd70ea096d1af3843792d5fba15c7f6bb66d5fca7fd832b39d523ff3b80fd288861b037677fbf0d07e652b0b08e99764aad824

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    78b0c8ffc25bbe19912611fd83b32a25

    SHA1

    4e575333d06221b6ff3224ecf2f853dbe2453460

    SHA256

    c132cc9c970600ec1b9ebee550a1357b84ac2698b3be824191779cb9b881d638

    SHA512

    2f0483a23e7344b8f5e474b62138f8b1bc4ac784ec2c377e24a86a5eff4c1eb5e0d1c83dbc62fcf6760c21104f2f4af48bd66560f663ab60b3f10847aad28847

  • C:\Users\Admin\AppData\Local\Temp\CabADD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB4D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2068-0-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB