Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2025 02:14

General

  • Target

    JaffaCakes118_1e411cf6a3d69cb9114fc3dcd01b7e96.exe

  • Size

    868KB

  • MD5

    1e411cf6a3d69cb9114fc3dcd01b7e96

  • SHA1

    cd463436df317092b5c78c65d9003f024ec9089b

  • SHA256

    1ab08ad3617c24214fae102a148aca6a226ca4ad421150d03cd1b94e0530a1de

  • SHA512

    708286d798aa5e862e3c9a7b8f56d49cb7fb50152f523c9a4d3dddba7df81aad3ca6564b88bf594abedba3532206ae929a22dcae94f501d95226eede0121cfe7

  • SSDEEP

    12288:oz2QauE/stl4yFstf0fy1WD3aW7QPCKB2yubdrMpeU/jlCjOXNtQzUkpX:oZaX/y4yly1WD/7QxJedYpprlKynQT

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e411cf6a3d69cb9114fc3dcd01b7e96.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e411cf6a3d69cb9114fc3dcd01b7e96.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e411cf6a3d69cb9114fc3dcd01b7e96.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e411cf6a3d69cb9114fc3dcd01b7e96.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e411cf6a3d69cb9114fc3dcd01b7e96.exe
        "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e411cf6a3d69cb9114fc3dcd01b7e96.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2360
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2676
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2668
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 620
          4⤵
          • Program crash
          PID:2588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat

    Filesize

    101B

    MD5

    69a6424130056f30ead9109c048ef8da

    SHA1

    ccc31db20640a19d222cdf6b5c2b3f64bb2eefae

    SHA256

    757120d3e2b392e115283cb1ee0f9df1eba4bd9f351e6cea1f060294250b7980

    SHA512

    f83e1317513b122f2f04c7c7749f1d053fe481e384bbafb2ecdb743e04929a9c866664cf6a0c9b4675030266f69f9741a90aca816e751a69a1dc79060b47d1f2

  • C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat

    Filesize

    50B

    MD5

    b774ae3fb1da087e1f83b4f7b2060e5a

    SHA1

    97eb9be49ac3af9c851c9e1e84e32bfd53e325a8

    SHA256

    adaf4a84b41e410b02e261cfd0fe7739d98647eab73c3badd32ac6e39f26351b

    SHA512

    f75d0f95f7306d26a12b414bfe37b97fbd37546cb3c6e403def7077329ddffb4b45d5c5f0ba0e7bb6d72851d2d691b0a85267beead42f7cbf2e8c3d45a3b4701

  • memory/2304-39-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2304-6-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2304-14-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2304-12-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2304-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2304-4-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2304-2-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2360-35-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2360-27-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2360-21-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2360-23-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2360-31-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2360-30-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2360-40-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2360-36-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2360-26-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2360-43-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2360-42-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2360-41-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2360-19-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2360-17-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2360-65-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2360-66-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB