Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2025 20:04

General

  • Target

    JaffaCakes118_d1c2f768f8e176f28029cf684c34600c.exe

  • Size

    838KB

  • MD5

    d1c2f768f8e176f28029cf684c34600c

  • SHA1

    a3a1b9c94c21b18648f02af18a9781aae4f29dd9

  • SHA256

    214749e416f40d30ace6cb3d06fdb72b31a8c7655aa099ff3720971f60409d8d

  • SHA512

    46d4c41da9d5389831c53d1b5e614f5bac2ef7824b0b117d7b4c4d6ddd981bfb9579e1152c871e8b0f17416e5bb1701d0087cdedb74a1863d3d639b9b775bb26

  • SSDEEP

    24576:ah/lKHX2g41tXPpozD/i9w9Z3//TVniDuEDP99:adQ4/9wnvLVniDuEDP9

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1c2f768f8e176f28029cf684c34600c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1c2f768f8e176f28029cf684c34600c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1c2f768f8e176f28029cf684c34600c.exe
      JaffaCakes118_d1c2f768f8e176f28029cf684c34600c.exe
      2⤵
        PID:316
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1c2f768f8e176f28029cf684c34600c.exe
        JaffaCakes118_d1c2f768f8e176f28029cf684c34600c.exe
        2⤵
        • Modifies WinLogon for persistence
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2132
        • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
          "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
            msdcsc.exe
            4⤵
              PID:2572
            • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
              msdcsc.exe
              4⤵
                PID:2600
        • C:\Windows\SysWOW64\DllHost.exe
          C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
          1⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          PID:2780

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7678Y.JPG

          Filesize

          21KB

          MD5

          0034cb69d18b059f05d41c6a660d9d08

          SHA1

          fa6ac2154bdce744f6a44cc5b2f24b3ab0a4120f

          SHA256

          2d6fa5599400e4e719f214c8155fea4755ce3fbcb38856eebbcd2b5d42e9c0df

          SHA512

          3279976dd2a003b1dd672aac0db6d5890ca2ce29ac94fb2a4b61dd7afeec763d59f236aaca71a9f7bced0aed4c904488b32bf9e57b265f1d0c4e82ebc0c48b1c

        • \Users\Admin\Documents\MSDCSC\msdcsc.exe

          Filesize

          838KB

          MD5

          d1c2f768f8e176f28029cf684c34600c

          SHA1

          a3a1b9c94c21b18648f02af18a9781aae4f29dd9

          SHA256

          214749e416f40d30ace6cb3d06fdb72b31a8c7655aa099ff3720971f60409d8d

          SHA512

          46d4c41da9d5389831c53d1b5e614f5bac2ef7824b0b117d7b4c4d6ddd981bfb9579e1152c871e8b0f17416e5bb1701d0087cdedb74a1863d3d639b9b775bb26

        • memory/2132-13-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2132-9-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2132-21-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2132-22-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2132-19-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2132-17-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2132-15-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2132-23-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2132-39-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2132-11-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2132-30-0x0000000000500000-0x0000000000502000-memory.dmp

          Filesize

          8KB

        • memory/2132-3-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2132-26-0x0000000000140000-0x0000000000141000-memory.dmp

          Filesize

          4KB

        • memory/2132-25-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2132-7-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2132-5-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/2448-24-0x0000000074560000-0x0000000074B0B000-memory.dmp

          Filesize

          5.7MB

        • memory/2448-2-0x0000000074560000-0x0000000074B0B000-memory.dmp

          Filesize

          5.7MB

        • memory/2448-1-0x0000000074560000-0x0000000074B0B000-memory.dmp

          Filesize

          5.7MB

        • memory/2448-0-0x0000000074561000-0x0000000074562000-memory.dmp

          Filesize

          4KB

        • memory/2780-31-0x00000000000B0000-0x00000000000B2000-memory.dmp

          Filesize

          8KB