Analysis

  • max time kernel
    94s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 18:28

General

  • Target

    JaffaCakes118_6e9e68a42adc84e29d47c5f9555ce060.exe

  • Size

    821KB

  • MD5

    6e9e68a42adc84e29d47c5f9555ce060

  • SHA1

    a576dc8081fd3780f237b909b38278e134f3c030

  • SHA256

    aea28dc9008d1cb019826bcda9ed2397d3c8a345d9c78d4ab104ff6263326df3

  • SHA512

    d79c1fae29bf4d18d2c5d542a0d0b0a6c4b5a59dae0f017c0ae8c8aeaae97642c3b51069fea7582208372f0c8a0fe26ed01d8fe042140205664fae6d5ad0cc9d

  • SSDEEP

    24576:F3nbWmJVJFwSddIXvfhqbiaxvRxq9tNY:BamdZdcBYw

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e9e68a42adc84e29d47c5f9555ce060.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e9e68a42adc84e29d47c5f9555ce060.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1568
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 5
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:4276
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4764
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 5
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:976
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 5
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:3048
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\system32\explorer.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat

    Filesize

    113B

    MD5

    89d4969afb8bb6b8effdea956e2b3ae4

    SHA1

    a6c4fede4f49da939ebb5e08b88b12f9a18ddf12

    SHA256

    1a7a99a9b42169c068a7875dc08b2903f00aba109eb2d91359048773c5fd00aa

    SHA512

    b10e90b326580d11c388665b3827b09b4cc0c79f02080e37e0bde4a5caa22216227553613b46a4e95dc8765705a534e74e6d490d4a812290c0289232a959140b

  • C:\Windows\SysWOW64\explorer.exe

    Filesize

    4.2MB

    MD5

    0155e85852fde62a441cbaf485e023be

    SHA1

    59482d4b1c0f061426ef71bff8506230faa00701

    SHA256

    e0689419d3d7879a229ecf3e74639e4e9ba0669ed4574f47b108097593fc9fbc

    SHA512

    f1a43adb7b0203dc5ad4613da9645070c4da0d15d8788b50644cb80420d4a38151488aa3888da39a6cb17ef6d3f5ebc5fe08ac948dca1fd0c852dceecd3bafff

  • memory/1568-0-0x00000000006B0000-0x00000000006B1000-memory.dmp

    Filesize

    4KB

  • memory/1568-14-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB