Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • submitted
    06/02/2025, 12:20

General

  • Target

    JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe

  • Size

    870KB

  • MD5

    ab1935bc92bd21dc3785047cf028ec5f

  • SHA1

    216604dbbeff4ce30e8ee51ef50156024cc91ae6

  • SHA256

    b22ff14ede69c70b647ff15860bfe0c3caac3fb5c6e9c57574d0675159af568c

  • SHA512

    47bb99e82733aac9066794d71c02a3b920ca433a53e5c7488abc29121ca1b658a924a5fc6256ddfd410a3d4e634ac2323989fbb84f4c8cea6e652871562eaae9

  • SSDEEP

    12288:rj7BhxQlLuUxnfSZrRGypSbai8Kx03Old+m5sO0NFMh/U+xNbul0NBs9oYojKxDs:rraM/PywFgMz2NK28Yu+

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

createaz.no-ip.info:1995

Mutex

DC_MUTEX-JRLV581

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    C=XVpvd=zF*i

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 28 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Users\Admin\AppData\Local\Temp\vbc.exe
      C:\Users\Admin\AppData\Local\Temp\vbc.exe
      2⤵
      • Modifies WinLogon for persistence
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Users\Admin\AppData\Local\Temp\STAR CRYPTER [PUBLIC] V1.3.EXE
        "C:\Users\Admin\AppData\Local\Temp\STAR CRYPTER [PUBLIC] V1.3.EXE"
        3⤵
        • Executes dropped EXE
        • Drops desktop.ini file(s)
        • Drops file in Windows directory
        PID:2336
      • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
        "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4556
        • C:\Users\Admin\AppData\Local\Temp\vbc.exe
          C:\Users\Admin\AppData\Local\Temp\vbc.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1700
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
              PID:3624
            • C:\Windows\explorer.exe
              "C:\Windows\explorer.exe"
              5⤵
                PID:1440

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\STAR CRYPTER [PUBLIC] V1.3.EXE

        Filesize

        166KB

        MD5

        3a858af0c3716a5db1cb1de25e715e16

        SHA1

        ae848d345737f2915294d4af3efd51b5c4a34ece

        SHA256

        ee1884836e964010846b5da3fa4e3572d668a560da4db6c10f0d42e3641805f6

        SHA512

        eb4abfba30a3f1a3f9a4622f544413c28c9791f71e859f0cc360e84b5308e445d7265358f407a2ac843b374c541b710432c7fb42a5de5f5ca34e334e70f1546f

      • C:\Users\Admin\AppData\Local\Temp\vbc.exe

        Filesize

        1.1MB

        MD5

        d881de17aa8f2e2c08cbb7b265f928f9

        SHA1

        08936aebc87decf0af6e8eada191062b5e65ac2a

        SHA256

        b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

        SHA512

        5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

      • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

        Filesize

        870KB

        MD5

        ab1935bc92bd21dc3785047cf028ec5f

        SHA1

        216604dbbeff4ce30e8ee51ef50156024cc91ae6

        SHA256

        b22ff14ede69c70b647ff15860bfe0c3caac3fb5c6e9c57574d0675159af568c

        SHA512

        47bb99e82733aac9066794d71c02a3b920ca433a53e5c7488abc29121ca1b658a924a5fc6256ddfd410a3d4e634ac2323989fbb84f4c8cea6e652871562eaae9

      • memory/1328-14-0x0000000075060000-0x0000000075611000-memory.dmp

        Filesize

        5.7MB

      • memory/1328-1-0x0000000075060000-0x0000000075611000-memory.dmp

        Filesize

        5.7MB

      • memory/1328-2-0x0000000075060000-0x0000000075611000-memory.dmp

        Filesize

        5.7MB

      • memory/1328-0-0x0000000075062000-0x0000000075063000-memory.dmp

        Filesize

        4KB

      • memory/1700-111-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-109-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-124-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-123-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-126-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-127-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-120-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-119-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-118-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-117-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-116-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-115-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-114-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-125-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-128-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-122-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-110-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-106-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-107-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-105-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/1700-121-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/2336-97-0x000000001E070000-0x000000001E08A000-memory.dmp

        Filesize

        104KB

      • memory/2336-36-0x000000001CA90000-0x000000001CADC000-memory.dmp

        Filesize

        304KB

      • memory/2336-112-0x00007FFED85A5000-0x00007FFED85A6000-memory.dmp

        Filesize

        4KB

      • memory/2336-113-0x00007FFED82F0000-0x00007FFED8C91000-memory.dmp

        Filesize

        9.6MB

      • memory/2336-35-0x00000000016C0000-0x00000000016C8000-memory.dmp

        Filesize

        32KB

      • memory/2336-34-0x000000001C830000-0x000000001C8CC000-memory.dmp

        Filesize

        624KB

      • memory/2336-30-0x000000001BD30000-0x000000001BDD6000-memory.dmp

        Filesize

        664KB

      • memory/2336-33-0x00007FFED82F0000-0x00007FFED8C91000-memory.dmp

        Filesize

        9.6MB

      • memory/2336-32-0x000000001C2B0000-0x000000001C77E000-memory.dmp

        Filesize

        4.8MB

      • memory/2336-31-0x00007FFED82F0000-0x00007FFED8C91000-memory.dmp

        Filesize

        9.6MB

      • memory/2336-29-0x00007FFED85A5000-0x00007FFED85A6000-memory.dmp

        Filesize

        4KB

      • memory/2932-9-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/2932-94-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/2932-12-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/2932-15-0x0000000000710000-0x0000000000711000-memory.dmp

        Filesize

        4KB

      • memory/2932-13-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/2932-10-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/2932-11-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB

      • memory/2932-5-0x0000000000400000-0x0000000000510000-memory.dmp

        Filesize

        1.1MB