Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/01/2025, 18:28

General

  • Target

    JaffaCakes118_6e9e68a42adc84e29d47c5f9555ce060.exe

  • Size

    821KB

  • MD5

    6e9e68a42adc84e29d47c5f9555ce060

  • SHA1

    a576dc8081fd3780f237b909b38278e134f3c030

  • SHA256

    aea28dc9008d1cb019826bcda9ed2397d3c8a345d9c78d4ab104ff6263326df3

  • SHA512

    d79c1fae29bf4d18d2c5d542a0d0b0a6c4b5a59dae0f017c0ae8c8aeaae97642c3b51069fea7582208372f0c8a0fe26ed01d8fe042140205664fae6d5ad0cc9d

  • SSDEEP

    24576:F3nbWmJVJFwSddIXvfhqbiaxvRxq9tNY:BamdZdcBYw

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e9e68a42adc84e29d47c5f9555ce060.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e9e68a42adc84e29d47c5f9555ce060.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2160
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2952
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 624
      2⤵
      • Program crash
      PID:2712

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat

          Filesize

          101B

          MD5

          204043ce28fd9d063dad1ffd3d3d8401

          SHA1

          93089366c9a5ce262c075c01312460357c62d974

          SHA256

          26d671c318128dbfb2df786c0840bdc06b6cbcf34a9a7fb1b34cff170740c9e6

          SHA512

          0975bdb2da75eca0ee7e6cb52f7aa62b468dd51f44fa5eb3468cb77bcbdd0b004e168c035d1b7794bae84e1dd9773df5bd421de1585678b16a94f6aab371b592

        • C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat

          Filesize

          50B

          MD5

          b774ae3fb1da087e1f83b4f7b2060e5a

          SHA1

          97eb9be49ac3af9c851c9e1e84e32bfd53e325a8

          SHA256

          adaf4a84b41e410b02e261cfd0fe7739d98647eab73c3badd32ac6e39f26351b

          SHA512

          f75d0f95f7306d26a12b414bfe37b97fbd37546cb3c6e403def7077329ddffb4b45d5c5f0ba0e7bb6d72851d2d691b0a85267beead42f7cbf2e8c3d45a3b4701

        • memory/628-0-0x00000000003F0000-0x00000000003F1000-memory.dmp

          Filesize

          4KB

        • memory/628-19-0x0000000000400000-0x00000000004DB000-memory.dmp

          Filesize

          876KB

        • memory/628-20-0x0000000000400000-0x00000000004DB000-memory.dmp

          Filesize

          876KB