Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2025 09:01

General

  • Target

    JaffaCakes118_97459200fc5a8c6e604a88b6fcf13993.exe

  • Size

    1.5MB

  • MD5

    97459200fc5a8c6e604a88b6fcf13993

  • SHA1

    dc9a30a961ad5cf99aabea8be1b078971c1d668d

  • SHA256

    5d8645c97b39a3b7a72fdcb62bd41ff69d557c5e062e75bc820b36cdef0cfee2

  • SHA512

    712677d401179eeb66d5219007e6c817f2eee504ebbd81536ba36ba9510f5ca860fe455cd2fec4047f7484925e84c988f3fe88d771e5cf76ab23fe781448674b

  • SSDEEP

    49152:i3lA4UeRKIh4AqciO8teg3vMo457q8hJGx3xwjl:i0qKg4Aq3Oweg3vx07rG/w5

Malware Config

Extracted

Family

darkcomet

Botnet

svchost.exe

C2

minecraft7788.sytes.net:1604

Mutex

svchost.exe

Attributes
  • InstallPath

    svchost.exe

  • gencode

    UUwV6fpdYG0j

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    svchost.exe

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97459200fc5a8c6e604a88b6fcf13993.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97459200fc5a8c6e604a88b6fcf13993.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\encrypted.exe
      "C:\Users\Admin\AppData\Local\Temp\encrypted.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Users\Admin\AppData\Local\Temp\temp.exe
        "C:\Users\Admin\AppData\Local\Temp\temp.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Windows\SysWOW64\notepad.exe
          notepad
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2784
        • C:\ProgramData\Microsoft\Windows\Start Menu\svchost.exe
          "C:\ProgramData\Microsoft\Windows\Start Menu\svchost.exe"
          4⤵
          • Modifies security service
          • Windows security bypass
          • Executes dropped EXE
          • Windows security modification
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:712
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
              PID:1420
            • C:\Windows\explorer.exe
              "C:\Windows\explorer.exe"
              5⤵
                PID:1652
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
        1⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:2080

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\search.jpg

        Filesize

        6KB

        MD5

        3dfd129a69335915752083a52230edd8

        SHA1

        9be3219ae6573a4812f6b43e287b9fad47faa028

        SHA256

        ca9222dfb2e389f9bc0fa26198b174b1f2993a307b5b3e6e73b6eecbf57c330a

        SHA512

        c2170b24c34cc98398b389c0afea364f65aeaa5dec130139ec29b1c8766d9cb6108a542cb1b56d3f0f1847f848d00a08fe0428e151e6da0fbe8ac48166cd26ce

      • C:\Users\Admin\AppData\Local\Temp\temp.exe

        Filesize

        658KB

        MD5

        c8f1f0558f2fc033a67922187309f048

        SHA1

        f010eef7a6231b38909f80caeb611b55743f3af0

        SHA256

        e0873babae99d7a69079c46a7aa24a5f5901d678eac4fc8751ccdf41aa14bfea

        SHA512

        79fe069256fd2dee1609907fc48a7ce7d859fc567fe08504aa4f959d7ae19e7fbe37485ce74739c8c938c10a90ab5718d3e2100202c6002e9208909bbec77c51

      • \Users\Admin\AppData\Local\Temp\encrypted.exe

        Filesize

        1.5MB

        MD5

        b9bd396ef7bb3be1513dfac7e22f96d6

        SHA1

        6573491d94258f1e1c001fc2e3e27be251963bca

        SHA256

        07d4352839fb0b16528e8ad0243544dbe368b27baadabccee4c1d2ef689bc197

        SHA512

        8a4334dff39bf7d68c3dbac01af77b04746996f5b1dc471cad539e7412eaa6f7c2a46437bcd8cd6461cf744a3574a1e6465dda457ffd0756b68e7a7b674d82d2

      • memory/712-87-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/712-85-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/712-88-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/712-90-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/712-91-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/712-83-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/712-86-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/712-89-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/712-92-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/712-84-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/712-79-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/712-80-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/712-81-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/712-82-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB

      • memory/1648-23-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

        Filesize

        9.6MB

      • memory/1648-33-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

        Filesize

        9.6MB

      • memory/1648-25-0x000007FEF6670000-0x000007FEF700D000-memory.dmp

        Filesize

        9.6MB

      • memory/1648-24-0x000000001AF70000-0x000000001B1C8000-memory.dmp

        Filesize

        2.3MB

      • memory/1648-20-0x000007FEF692E000-0x000007FEF692F000-memory.dmp

        Filesize

        4KB

      • memory/2080-22-0x00000000000E0000-0x00000000000E2000-memory.dmp

        Filesize

        8KB

      • memory/2112-21-0x0000000000C20000-0x0000000000C22000-memory.dmp

        Filesize

        8KB

      • memory/2784-38-0x0000000000090000-0x0000000000091000-memory.dmp

        Filesize

        4KB

      • memory/2784-66-0x00000000001A0000-0x00000000001A1000-memory.dmp

        Filesize

        4KB

      • memory/2900-77-0x0000000000400000-0x00000000004B2000-memory.dmp

        Filesize

        712KB