Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2025, 06:12

General

  • Target

    JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe

  • Size

    1.6MB

  • MD5

    b3df1761ad3b759e0759516bbcfc27c5

  • SHA1

    ba9af5d9c407c527cc568421300302be09ebfdbe

  • SHA256

    a8929b3d5c5a904027ada86379a74de93eb61eaee734eee53848220c8c220b69

  • SHA512

    5ee8d97cd3a977f5bfc7c59b1199e1e8025a22e260328acd124d4dbd0b820a54332ef53a248fb9fe9139902fa57a2b43f28570dcbe4c347a99815150d028c2be

  • SSDEEP

    49152:jhjcapo0JfYDSGvOsUhjcapo0JfYDSGvOs:V9lfYDSYW9lfYDSY

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Users\Admin\AppData\Local\Temp\rzFumz.exe
      "C:\Users\Admin\AppData\Local\Temp\rzFumz.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2080
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
          PID:2684

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\rzFumz.exe

      Filesize

      820KB

      MD5

      4e60c5b5b0e6de2d865a90abc56a6543

      SHA1

      e3481866659a68e9e4821943093003ca87ed9713

      SHA256

      78c3e8fd1b03bdbdc661f0c2312f034ffbf992d578aff817b77100af2e23f052

      SHA512

      b86d983ee65c84b34711d9be09a1b2a5de48d61442de4c54c6f0ef3dced2abb3930cad912ce86619f9095445f583fb8d51e50ffdf28e6ddae39108c395d6b05e

    • memory/2080-33-0x0000000000400000-0x00000000004DB000-memory.dmp

      Filesize

      876KB

    • memory/2684-37-0x0000000000400000-0x000000000051E000-memory.dmp

      Filesize

      1.1MB

    • memory/2740-35-0x0000000000400000-0x00000000004DB000-memory.dmp

      Filesize

      876KB

    • memory/2760-1-0x0000000074FC0000-0x000000007556B000-memory.dmp

      Filesize

      5.7MB

    • memory/2760-2-0x0000000074FC0000-0x000000007556B000-memory.dmp

      Filesize

      5.7MB

    • memory/2760-40-0x0000000074FC0000-0x000000007556B000-memory.dmp

      Filesize

      5.7MB

    • memory/2760-0-0x0000000074FC1000-0x0000000074FC2000-memory.dmp

      Filesize

      4KB

    • memory/2896-26-0x0000000000400000-0x00000000004DB000-memory.dmp

      Filesize

      876KB

    • memory/2896-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2896-38-0x0000000000400000-0x00000000004DB000-memory.dmp

      Filesize

      876KB

    • memory/2896-24-0x0000000000400000-0x00000000004DB000-memory.dmp

      Filesize

      876KB

    • memory/2896-22-0x0000000000400000-0x00000000004DB000-memory.dmp

      Filesize

      876KB

    • memory/2896-20-0x0000000000400000-0x00000000004DB000-memory.dmp

      Filesize

      876KB

    • memory/2896-18-0x0000000000400000-0x00000000004DB000-memory.dmp

      Filesize

      876KB

    • memory/2896-16-0x0000000000400000-0x00000000004DB000-memory.dmp

      Filesize

      876KB

    • memory/2896-14-0x0000000000400000-0x00000000004DB000-memory.dmp

      Filesize

      876KB

    • memory/2896-12-0x0000000000400000-0x00000000004DB000-memory.dmp

      Filesize

      876KB

    • memory/2896-36-0x0000000000400000-0x00000000004DB000-memory.dmp

      Filesize

      876KB

    • memory/2896-34-0x0000000000400000-0x00000000004DB000-memory.dmp

      Filesize

      876KB

    • memory/2896-32-0x0000000000400000-0x00000000004DB000-memory.dmp

      Filesize

      876KB