Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/02/2025, 09:28

General

  • Target

    JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe

  • Size

    3.3MB

  • MD5

    a9a86cc663da436d7cb53716088f7b94

  • SHA1

    bb63636ec07e6efadc3854462cdb99a6ff1500c3

  • SHA256

    8041b51c8456106f557803b98c4579c2e720f4b5a184a853c19a3155ffa44b11

  • SHA512

    2a90ad5e1bb420f289d80340be0ebce70c7734f6848eb1163b8074cb00bc82dd21c452b53b5fa4fea4d59d8fd42d7a3e9d1c87abb1f479f0633a92531debf32b

  • SSDEEP

    98304:o06cZJ+wPOa2lMqvB4buVEucwK1EFrAg:o8/+wP0j4bu6ufK1EFr

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 3 IoCs
  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe
      "C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2412
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Checks BIOS information in registry
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\SysWOW64\notepad.exe
        notepad
        3⤵
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2852
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\SysWOW64\explorer.exe"
        3⤵
          PID:1372
        • C:\Windows\svchost\svchost.exe
          "C:\Windows\svchost\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe
            "C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            PID:2884
          • C:\Windows\svchost\svchost.exe
            "C:\Windows\svchost\svchost.exe"
            4⤵
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of AdjustPrivilegeToken
            PID:1412
            • C:\Windows\SysWOW64\explorer.exe
              "C:\Windows\SysWOW64\explorer.exe"
              5⤵
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2448
              • C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe
                "C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe"
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: GetForegroundWindowSpam
                PID:2444
              • C:\Windows\SysWOW64\explorer.exe
                "C:\Windows\SysWOW64\explorer.exe"
                6⤵
                • Checks BIOS information in registry
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Enumerates system info in registry
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1780
                • C:\Windows\SysWOW64\notepad.exe
                  C:\Windows\SysWOW64\notepad.exe
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:2696

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\beepa.bmp

      Filesize

      386KB

      MD5

      2707dcacb5a91e821ba0b19a36e0bd80

      SHA1

      d1df596f3d7575b27016f5002ce21c00879895e3

      SHA256

      a09519cae3faca1f43cab115233a745d20312a3e22e7ecd809b291079a8691f2

      SHA512

      dfd9a8e97151107ef2ef3a9eb274b695ca633c314ff5f3d41b3750a9d9d70fee84993a63b61acf9b0de6aebbc59554ea75af22b5eb3ac78d354567342ff27c24

    • \Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe

      Filesize

      2.5MB

      MD5

      91e827bc0281f6a3c1413332cd7cefee

      SHA1

      5fdbe6e02ab1bdeb4c0af61545be0a85bb1f186f

      SHA256

      e85bb6764b82f43c71a3364d6c9a06c640242efdcd805e9fc54fa227545d6ac5

      SHA512

      cf005600b44433e6ae457de7da1bec826e3b6400f99e287472c9538a850272446b71c33ba319f1f87b6f698e1e0ecf97003e0f75e5ada72927577f830bbf46a2

    • \Users\Admin\AppData\Local\Temp\nsjA3FE.tmp\AdvSplash.dll

      Filesize

      6KB

      MD5

      13cc92f90a299f5b2b2f795d0d2e47dc

      SHA1

      aa69ead8520876d232c6ed96021a4825e79f542f

      SHA256

      eb1ca2b3a6e564c32677d0cdc388e26b74ef686e071d7dbca44d0bfa10488feb

      SHA512

      ff4e6e6e7104568fc85ef3a3f0494a5c7822a4ceaf65c584ad534f08f9a472a8d86f0a62f1f86343c61e2540b2254714b7ea43e4b312ff13d8271ff069386fa3

    • \Users\Admin\AppData\Local\Temp\nsjA3FE.tmp\StartMenu.dll

      Filesize

      7KB

      MD5

      a4173b381625f9f12aadb4e1cdaefdb8

      SHA1

      cf1680c2bc970d5675adbf5e89292a97e6724713

      SHA256

      7755ff2707ca19344d489a5acec02d9e310425fa6e100d2f13025761676b875b

      SHA512

      fcac79d42862da6bdd3ecad9d887a975cdff2301a8322f321be58f754a26b27077b452faa4751bbd09cd3371b4afce65255fbbb443e2c93dd2cba0ba652f4a82

    • \Windows\svchost\svchost.exe

      Filesize

      3.3MB

      MD5

      a9a86cc663da436d7cb53716088f7b94

      SHA1

      bb63636ec07e6efadc3854462cdb99a6ff1500c3

      SHA256

      8041b51c8456106f557803b98c4579c2e720f4b5a184a853c19a3155ffa44b11

      SHA512

      2a90ad5e1bb420f289d80340be0ebce70c7734f6848eb1163b8074cb00bc82dd21c452b53b5fa4fea4d59d8fd42d7a3e9d1c87abb1f479f0633a92531debf32b

    • memory/1412-104-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/1412-98-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/1412-97-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/1780-120-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/2448-101-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2448-103-0x0000000000400000-0x000000000074A000-memory.dmp

      Filesize

      3.3MB

    • memory/2448-102-0x0000000000400000-0x000000000074A000-memory.dmp

      Filesize

      3.3MB

    • memory/2448-99-0x0000000000400000-0x000000000074A000-memory.dmp

      Filesize

      3.3MB

    • memory/2564-18-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/2564-77-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/2564-19-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2564-21-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/2564-23-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/2564-24-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/2564-22-0x0000000013140000-0x00000000131F6000-memory.dmp

      Filesize

      728KB

    • memory/2852-26-0x0000000000100000-0x0000000000101000-memory.dmp

      Filesize

      4KB

    • memory/2852-66-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB