Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/01/2025, 00:39 UTC

General

  • Target

    JaffaCakes118_50e93ac55ff74b46be448f4adf103c43.exe

  • Size

    692KB

  • MD5

    50e93ac55ff74b46be448f4adf103c43

  • SHA1

    b517f5f669048508ac90bbc662b6af9066fd3ff9

  • SHA256

    5b01cd848be1f1a8c9a3ed3aa59508be568abeaef19b287c200fe18723783ed1

  • SHA512

    38eed2dfe534551daae8322b1b9cff1dd141564d6dd1761b934871effd6a498af8e3781bade3105e135aaedc7696c0a3c8d9bc773862d9b9536b6a30cda746a3

  • SSDEEP

    12288:8XhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy452U3:qnAw2WWeFcfbP9VPSPMTSPL/rWvzq4Jn

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

gehackt.no-ip.org:1604

gehackt.no-ip.org:3389

Mutex

DC_MUTEX-F3NGXVX

Attributes
  • InstallPath

    MSDCSC\svchost.exe

  • gencode

    97X125MJWil4

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50e93ac55ff74b46be448f4adf103c43.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50e93ac55ff74b46be448f4adf103c43.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4624
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50e93ac55ff74b46be448f4adf103c43.exe" +s +h
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4424
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50e93ac55ff74b46be448f4adf103c43.exe" +s +h
        3⤵
        • Sets file to hidden
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2016
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2188
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Sets file to hidden
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:4192
    • C:\Windows\SysWOW64\notepad.exe
      notepad
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:64
    • C:\Users\Admin\AppData\Local\Temp\MSDCSC\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\MSDCSC\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Windows\SysWOW64\notepad.exe
        notepad
        3⤵
        • System Location Discovery: System Language Discovery
        PID:776

Network

  • flag-us
    DNS
    134.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    134.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    205.47.74.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    205.47.74.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    8.153.16.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.153.16.2.in-addr.arpa
    IN PTR
    Response
    8.153.16.2.in-addr.arpa
    IN PTR
    a2-16-153-8deploystaticakamaitechnologiescom
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    19.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    19.229.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    gehackt.no-ip.org
    svchost.exe
    Remote address:
    8.8.8.8:53
    Request
    gehackt.no-ip.org
    IN A
    Response
  • flag-us
    DNS
    252.15.104.51.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    252.15.104.51.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    134.32.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    134.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    205.47.74.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    205.47.74.20.in-addr.arpa

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    8.153.16.2.in-addr.arpa
    dns
    69 B
    131 B
    1
    1

    DNS Request

    8.153.16.2.in-addr.arpa

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    19.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    19.229.111.52.in-addr.arpa

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    gehackt.no-ip.org
    dns
    svchost.exe
    63 B
    123 B
    1
    1

    DNS Request

    gehackt.no-ip.org

  • 8.8.8.8:53
    252.15.104.51.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    252.15.104.51.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSDCSC\svchost.exe

    Filesize

    692KB

    MD5

    50e93ac55ff74b46be448f4adf103c43

    SHA1

    b517f5f669048508ac90bbc662b6af9066fd3ff9

    SHA256

    5b01cd848be1f1a8c9a3ed3aa59508be568abeaef19b287c200fe18723783ed1

    SHA512

    38eed2dfe534551daae8322b1b9cff1dd141564d6dd1761b934871effd6a498af8e3781bade3105e135aaedc7696c0a3c8d9bc773862d9b9536b6a30cda746a3

  • memory/64-3-0x00000000010A0000-0x00000000010A1000-memory.dmp

    Filesize

    4KB

  • memory/776-64-0x0000000000820000-0x0000000000821000-memory.dmp

    Filesize

    4KB

  • memory/1400-68-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1400-70-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1400-65-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1400-66-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1400-67-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1400-78-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1400-69-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1400-77-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1400-71-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1400-72-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1400-73-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1400-74-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1400-75-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1400-76-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/4624-62-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/4624-0-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.