Resubmissions

06/02/2025, 22:20

250206-19acfaypez 10

06/02/2025, 21:54

250206-1sgp7ayjes 10

Analysis

  • max time kernel
    94s
  • max time network
    86s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250128-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    06/02/2025, 22:20

Errors

Reason
Machine shutdown

General

  • Target

    JaffaCakes118_afbb43b5c3423ac5da015f88581d55a8.exe

  • Size

    712KB

  • MD5

    afbb43b5c3423ac5da015f88581d55a8

  • SHA1

    46e43b61c1598aaa390c54bd2978b005da11809c

  • SHA256

    71fb3b2c304637f50ef8c19c0e924ca5439e6860921a967b3d89efc04f0b2d4b

  • SHA512

    65ad673f53ee1ea1ef881fa644e0ff90e3d337ab8e6d9205dcf831e3cfe51258a5ee0969c2ab6705e6d7533c57ba039923490fff32b4455cd40573a71e6765af

  • SSDEEP

    12288:IaAchpWsuVtDnBsBDJIcynnC90levX4CuYf2D82T3s99+VHuNK1O:pAEE3uBDhynCylQgi63O9+VuNkO

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_afbb43b5c3423ac5da015f88581d55a8.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_afbb43b5c3423ac5da015f88581d55a8.exe"
    1⤵
    • Checks BIOS information in registry
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:6000
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Checks processor information in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:760
    • C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe
      "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe"
      2⤵
      • Drops file in System32 directory
      PID:2872
      • C:\Windows\system32\wininit.exe
        "C:\Windows\system32\wininit.exe"
        3⤵
          PID:5036
    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
      1⤵
      • Drops file in System32 directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:3944

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_42vz5dij.cke.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Windows\System32\catroot2\dberr.txt

      Filesize

      51KB

      MD5

      e82bdc8f620ddd2b381e3e3ab67b03da

      SHA1

      9a1f4c56d20665601dbc444ea35ed7420bf6381d

      SHA256

      14a71dca931bc99da09b47ccfc240183fe3c302540a344c4c76845c65c35cf4a

      SHA512

      3b31605793514529ceb8c73a3b619244ad55d8b2571bdd62fb51295d326e9b9b81a4a6891e3ec50c5b0ca10dd2f49d5f65f7feb00a53214ba662e8c9bb258918

    • memory/760-7-0x000001C18C840000-0x000001C18C841000-memory.dmp

      Filesize

      4KB

    • memory/760-13-0x000001C18C840000-0x000001C18C841000-memory.dmp

      Filesize

      4KB

    • memory/760-12-0x000001C18C840000-0x000001C18C841000-memory.dmp

      Filesize

      4KB

    • memory/760-11-0x000001C18C840000-0x000001C18C841000-memory.dmp

      Filesize

      4KB

    • memory/760-10-0x000001C18C840000-0x000001C18C841000-memory.dmp

      Filesize

      4KB

    • memory/760-9-0x000001C18C840000-0x000001C18C841000-memory.dmp

      Filesize

      4KB

    • memory/760-8-0x000001C18C840000-0x000001C18C841000-memory.dmp

      Filesize

      4KB

    • memory/760-3-0x000001C18C840000-0x000001C18C841000-memory.dmp

      Filesize

      4KB

    • memory/760-1-0x000001C18C840000-0x000001C18C841000-memory.dmp

      Filesize

      4KB

    • memory/760-2-0x000001C18C840000-0x000001C18C841000-memory.dmp

      Filesize

      4KB

    • memory/2872-34-0x0000025EEDA50000-0x0000025EEDA72000-memory.dmp

      Filesize

      136KB

    • memory/2872-41-0x0000025EEDE00000-0x0000025EEDE76000-memory.dmp

      Filesize

      472KB

    • memory/2872-40-0x0000025EEDD30000-0x0000025EEDD74000-memory.dmp

      Filesize

      272KB

    • memory/6000-14-0x0000000000400000-0x00000000004C0000-memory.dmp

      Filesize

      768KB

    • memory/6000-21-0x0000000000400000-0x00000000004C0000-memory.dmp

      Filesize

      768KB

    • memory/6000-17-0x0000000000400000-0x00000000004C0000-memory.dmp

      Filesize

      768KB

    • memory/6000-16-0x0000000000400000-0x00000000004C0000-memory.dmp

      Filesize

      768KB

    • memory/6000-15-0x00000000022B0000-0x00000000022B1000-memory.dmp

      Filesize

      4KB

    • memory/6000-0-0x00000000022B0000-0x00000000022B1000-memory.dmp

      Filesize

      4KB