Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2025 09:01

General

  • Target

    JaffaCakes118_97459200fc5a8c6e604a88b6fcf13993.exe

  • Size

    1.5MB

  • MD5

    97459200fc5a8c6e604a88b6fcf13993

  • SHA1

    dc9a30a961ad5cf99aabea8be1b078971c1d668d

  • SHA256

    5d8645c97b39a3b7a72fdcb62bd41ff69d557c5e062e75bc820b36cdef0cfee2

  • SHA512

    712677d401179eeb66d5219007e6c817f2eee504ebbd81536ba36ba9510f5ca860fe455cd2fec4047f7484925e84c988f3fe88d771e5cf76ab23fe781448674b

  • SSDEEP

    49152:i3lA4UeRKIh4AqciO8teg3vMo457q8hJGx3xwjl:i0qKg4Aq3Oweg3vx07rG/w5

Malware Config

Extracted

Family

darkcomet

Botnet

svchost.exe

C2

minecraft7788.sytes.net:1604

Mutex

svchost.exe

Attributes
  • InstallPath

    svchost.exe

  • gencode

    UUwV6fpdYG0j

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    svchost.exe

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97459200fc5a8c6e604a88b6fcf13993.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97459200fc5a8c6e604a88b6fcf13993.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Users\Admin\AppData\Local\Temp\encrypted.exe
      "C:\Users\Admin\AppData\Local\Temp\encrypted.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Users\Admin\AppData\Local\Temp\temp.exe
        "C:\Users\Admin\AppData\Local\Temp\temp.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4336
        • C:\Windows\SysWOW64\notepad.exe
          notepad
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3000
        • C:\ProgramData\Microsoft\Windows\Start Menu\svchost.exe
          "C:\ProgramData\Microsoft\Windows\Start Menu\svchost.exe"
          4⤵
          • Modifies security service
          • Windows security bypass
          • Executes dropped EXE
          • Windows security modification
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2956
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies security service
            • Windows security bypass
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\encrypted.exe

    Filesize

    1.5MB

    MD5

    b9bd396ef7bb3be1513dfac7e22f96d6

    SHA1

    6573491d94258f1e1c001fc2e3e27be251963bca

    SHA256

    07d4352839fb0b16528e8ad0243544dbe368b27baadabccee4c1d2ef689bc197

    SHA512

    8a4334dff39bf7d68c3dbac01af77b04746996f5b1dc471cad539e7412eaa6f7c2a46437bcd8cd6461cf744a3574a1e6465dda457ffd0756b68e7a7b674d82d2

  • C:\Users\Admin\AppData\Local\Temp\temp.exe

    Filesize

    658KB

    MD5

    c8f1f0558f2fc033a67922187309f048

    SHA1

    f010eef7a6231b38909f80caeb611b55743f3af0

    SHA256

    e0873babae99d7a69079c46a7aa24a5f5901d678eac4fc8751ccdf41aa14bfea

    SHA512

    79fe069256fd2dee1609907fc48a7ce7d859fc567fe08504aa4f959d7ae19e7fbe37485ce74739c8c938c10a90ab5718d3e2100202c6002e9208909bbec77c51

  • memory/728-95-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2464-18-0x000000001C0F0000-0x000000001C348000-memory.dmp

    Filesize

    2.3MB

  • memory/2464-17-0x00007FFB412E0000-0x00007FFB41C81000-memory.dmp

    Filesize

    9.6MB

  • memory/2464-19-0x000000001B640000-0x000000001B6E6000-memory.dmp

    Filesize

    664KB

  • memory/2464-16-0x00007FFB412E0000-0x00007FFB41C81000-memory.dmp

    Filesize

    9.6MB

  • memory/2464-15-0x000000001BC20000-0x000000001C0EE000-memory.dmp

    Filesize

    4.8MB

  • memory/2464-32-0x00007FFB412E0000-0x00007FFB41C81000-memory.dmp

    Filesize

    9.6MB

  • memory/2464-14-0x00007FFB41595000-0x00007FFB41596000-memory.dmp

    Filesize

    4KB

  • memory/2956-96-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/3000-36-0x00000000012D0000-0x00000000012D1000-memory.dmp

    Filesize

    4KB

  • memory/4336-97-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB