Analysis

  • max time kernel
    125s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2025 04:59

General

  • Target

    JaffaCakes118_77c4ad9fa0364411adf59f27ab28bc56.exe

  • Size

    301KB

  • MD5

    77c4ad9fa0364411adf59f27ab28bc56

  • SHA1

    c09d1b976fc047e9a605e476bc8f605123654fbf

  • SHA256

    5938462ee18d19cf21ffd6a9850325f2413eee04747903e8a3563148b14b3227

  • SHA512

    66f7f3d1b59ff7d940a8bc95ddba491913a1cd7efeabf57d5e3df6f2e4991ba8837b77c9dab461318555f5c0abbe40fe64e2a36f998168aa59a54cfd799b875c

  • SSDEEP

    6144:xbaepOgEy+AT5JPPiFrF6UTcz/DJZoAwDuRS/xrgvVMJ5b:9a2dEy+ATrPiFXEJZoAwDuigv

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77c4ad9fa0364411adf59f27ab28bc56.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77c4ad9fa0364411adf59f27ab28bc56.exe"
    1⤵
    • Modifies firewall policy service
    • Disables RegEdit via registry modification
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Sets file to hidden
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2892
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Sets file to hidden
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:592
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\NEUES RTF-DOKUMENT.RTF"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:528
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2060
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        2⤵
          PID:2992
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 732
          2⤵
          • Program crash
          PID:2768

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\NEUES RTF-DOKUMENT.RTF

        Filesize

        7B

        MD5

        8274425de767b30b2fff1124ab54abb5

        SHA1

        2201589aa3ed709b3665e4ff979e10c6ad5137fc

        SHA256

        0d6afb7e939f0936f40afdc759b5a354ea5427ec250a47e7b904ab1ea800a01d

        SHA512

        16f1647b22ca8679352e232c7dcbcdcba224c9b045c70e572bf061b2996f251cbd65a152557409f17be9417b23460adebe5de08d2dea30d13a64e22f6607206b

      • C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat

        Filesize

        101B

        MD5

        e7dac7045e27fddb3b7dccb8ea9749a5

        SHA1

        2ac2aa00b4ab4a101b39bf141059c688125791ef

        SHA256

        00cb63d818958d1c90ba0064bcff979bb6ba68924fc52140b7036ec82654e749

        SHA512

        ef7664b45cac47e0b2d0b07b799e151d337938b0a558d100ea035f25222ecbe2c1ef334139012e4446dd0f0dc49342339a45c9b6d0dd360a45e55ba7da07b594

      • C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat

        Filesize

        50B

        MD5

        b774ae3fb1da087e1f83b4f7b2060e5a

        SHA1

        97eb9be49ac3af9c851c9e1e84e32bfd53e325a8

        SHA256

        adaf4a84b41e410b02e261cfd0fe7739d98647eab73c3badd32ac6e39f26351b

        SHA512

        f75d0f95f7306d26a12b414bfe37b97fbd37546cb3c6e403def7077329ddffb4b45d5c5f0ba0e7bb6d72851d2d691b0a85267beead42f7cbf2e8c3d45a3b4701

      • memory/528-21-0x000000002F4F1000-0x000000002F4F2000-memory.dmp

        Filesize

        4KB

      • memory/528-22-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/528-23-0x0000000070E2D000-0x0000000070E38000-memory.dmp

        Filesize

        44KB

      • memory/528-33-0x0000000070E2D000-0x0000000070E38000-memory.dmp

        Filesize

        44KB

      • memory/2380-0-0x0000000000400000-0x00000000004E1000-memory.dmp

        Filesize

        900KB

      • memory/2380-1-0x00000000003E0000-0x00000000003E1000-memory.dmp

        Filesize

        4KB

      • memory/2380-31-0x00000000003E0000-0x00000000003E1000-memory.dmp

        Filesize

        4KB

      • memory/2380-32-0x0000000000400000-0x00000000004E1000-memory.dmp

        Filesize

        900KB

      • memory/2380-35-0x0000000000400000-0x00000000004E1000-memory.dmp

        Filesize

        900KB