Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/02/2025, 07:08

General

  • Target

    JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe

  • Size

    4.2MB

  • MD5

    b4570a04fa7d1ac33afb101300c73d54

  • SHA1

    4522fb0cf2c0aee291842688c20020651343c4a0

  • SHA256

    69cbfbc1b1ab38241efbeeb9cf2bbd839448981f4f10ee6b1e4bc5d21f2acb3b

  • SHA512

    5c768a29e0be735ac691cfbae2f40b238e9782b9b9d6c0edda98d595b3defd0324bd132180bd8d7e2944349940fa69645d31ade649828992b10bd2fdd0bb153f

  • SSDEEP

    98304:5Ff3GTKdT1WUBSDiUpYCpjnjTyuGkQcdBDY2yP6uvrGNrAWsJA:5FuKdRWUBSDnbHfhjzyP6mWI

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3884
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\_gasqmke.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3100
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES784E.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC784D.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4028
    • C:\Users\Admin\AppData\Local\Temp\ǭȜƂƈӂ.exe
      "C:\Users\Admin\AppData\Local\Temp\ǭȜƂƈӂ.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:4140
    • C:\Users\Admin\AppData\Local\Temp\taskmgr.exe
      C:\Users\Admin\AppData\Local\Temp\taskmgr.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2720
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\מישל כהן יש מקום ביצוע הגמר.mp3"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:5004
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4b4 0x464
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES784E.tmp

    Filesize

    1KB

    MD5

    a9c9e57a04bf8e1a7cb31c2186577431

    SHA1

    a21422bc35b409d72721f13d5edc81bac6a77c67

    SHA256

    7283cf96bea70b0d7c77d6550bc2406dc62584908571fb8047d0d4d6d006a936

    SHA512

    dc85829312ec5959400560e7815e460bfac4b446b116c3b12bb3c46ce8118994b35f9cc44c6e1150861f01b115d6072aae06ed84f11770f3ec0fd256d9be344f

  • C:\Users\Admin\AppData\Local\Temp\taskmgr.exe

    Filesize

    34KB

    MD5

    e118330b4629b12368d91b9df6488be0

    SHA1

    ce90218c7e3b90df2a3409ec253048bb6472c2fd

    SHA256

    3a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9

    SHA512

    ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0

  • C:\Users\Admin\AppData\Local\Temp\ǭȜƂƈӂ.exe

    Filesize

    4KB

    MD5

    9ebce9003510ba747362ef47d948a7c1

    SHA1

    9e88e98db4cffa9e00badca03026cc4f898a4d6b

    SHA256

    4d0d4e2979a328564e541b387bc0acb438b22a72651b703182cee8df8c5acf1b

    SHA512

    ede4e8e6f0ff371082b39800a1787f0f2bb377f627da2ccfdcea8facee18f3cb33e6154f0452c65b6b8262d887c3cb3a643a46c8222b39bbf888a5149c4dea5b

  • C:\Users\Admin\AppData\Local\Temp\מישל כהן יש מקום ביצוע הגמר.mp3

    Filesize

    3.1MB

    MD5

    dfd312879ce215a472ccfff1f6edcc83

    SHA1

    1ed6991e2876a8f3921e0629980acb7ea6482d19

    SHA256

    e707e9a797191b9f64d3a5fc48b09ca49a429b35b1d9bef250f30bd75278e23d

    SHA512

    b5d2e82e8be7b930f678cf2c227e59f0de2fadb7b3c5c9b408ded5396a2254b9bb3976c34d3c6412cf71968f0ae8446c1b197b969b464bc613f178898a52d736

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC784D.tmp

    Filesize

    636B

    MD5

    50363950c08ac8e50585c99d2ffa9f71

    SHA1

    d8f71b835a534ce0ff378c62a9a78558eda9c235

    SHA256

    ea2e0d4bf91002fa267b3ea49cd25d3ed3a4aaac88ff14fc7b14d09506eb0ae1

    SHA512

    96029d490fd171a02f42019a3b983d7dc3a638f1812527510aae571f7760bc72ecfd29e4bdb8ac1a3a2d5af83b931ac8fdfce0af9ec33247d0243e8f4bdbe025

  • \??\c:\Users\Admin\AppData\Local\Temp\_gasqmke.0.cs

    Filesize

    1KB

    MD5

    f89d88c9df4920a28f1e50bdd677686e

    SHA1

    956a7b21a6a243588db21f24eb19f36e75128367

    SHA256

    7b250b2607bb276cf970952c966eec884d9d1586eb2f27ee9155376a0e820537

    SHA512

    3ce3f52e9c440924dd47cd35ed78763b15eafbbcf1777c1e5fc7587b278108a1096aeeb81568e394532c75db1ffb785e24e66e752333e41971096556e3dee4ce

  • \??\c:\Users\Admin\AppData\Local\Temp\_gasqmke.cmdline

    Filesize

    263B

    MD5

    6f975b2d1b05172a04e14aa2736763f6

    SHA1

    cfbe4b2a4a326559132a5d1680d7553e7d1025fc

    SHA256

    b73218741b46fcf26db7c53bf14eeaaea5f8a1016c21b4762521d6a7ddfd53d8

    SHA512

    12aa73fe18f4fd8525db258bdafa16544f0281dc6515706f0f9f66d8ea8ce20617797c838600e855e7e10c5bd0852480848bc0a1306889c230d5114dc4e11583

  • memory/2720-33-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/2720-28-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/2720-34-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/2720-32-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/2720-48-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/2720-31-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/2720-26-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/2720-23-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/3100-8-0x00000000751E0000-0x0000000075791000-memory.dmp

    Filesize

    5.7MB

  • memory/3100-15-0x00000000751E0000-0x0000000075791000-memory.dmp

    Filesize

    5.7MB

  • memory/3884-0-0x00000000751E2000-0x00000000751E3000-memory.dmp

    Filesize

    4KB

  • memory/3884-39-0x00000000751E0000-0x0000000075791000-memory.dmp

    Filesize

    5.7MB

  • memory/3884-2-0x00000000751E0000-0x0000000075791000-memory.dmp

    Filesize

    5.7MB

  • memory/3884-1-0x00000000751E0000-0x0000000075791000-memory.dmp

    Filesize

    5.7MB

  • memory/4140-19-0x00000000751E0000-0x0000000075791000-memory.dmp

    Filesize

    5.7MB

  • memory/4140-42-0x00000000751E0000-0x0000000075791000-memory.dmp

    Filesize

    5.7MB

  • memory/4140-20-0x00000000751E0000-0x0000000075791000-memory.dmp

    Filesize

    5.7MB

  • memory/5004-49-0x00007FF725E20000-0x00007FF725F18000-memory.dmp

    Filesize

    992KB

  • memory/5004-50-0x00007FFE7F990000-0x00007FFE7F9C4000-memory.dmp

    Filesize

    208KB

  • memory/5004-58-0x00007FFE7EE10000-0x00007FFE7EE21000-memory.dmp

    Filesize

    68KB

  • memory/5004-59-0x00007FFE70000000-0x00007FFE7020B000-memory.dmp

    Filesize

    2.0MB

  • memory/5004-66-0x00007FFE70E30000-0x00007FFE70E4B000-memory.dmp

    Filesize

    108KB

  • memory/5004-65-0x00007FFE71860000-0x00007FFE71871000-memory.dmp

    Filesize

    68KB

  • memory/5004-64-0x00007FFE71880000-0x00007FFE71891000-memory.dmp

    Filesize

    68KB

  • memory/5004-63-0x00007FFE77180000-0x00007FFE77191000-memory.dmp

    Filesize

    68KB

  • memory/5004-62-0x00007FFE7DB60000-0x00007FFE7DB78000-memory.dmp

    Filesize

    96KB

  • memory/5004-61-0x00007FFE7DAC0000-0x00007FFE7DAE1000-memory.dmp

    Filesize

    132KB

  • memory/5004-60-0x00007FFE70E50000-0x00007FFE70E91000-memory.dmp

    Filesize

    260KB

  • memory/5004-57-0x00007FFE7EE30000-0x00007FFE7EE4D000-memory.dmp

    Filesize

    116KB

  • memory/5004-56-0x00007FFE7EF20000-0x00007FFE7EF31000-memory.dmp

    Filesize

    68KB

  • memory/5004-51-0x00007FFE70400000-0x00007FFE706B6000-memory.dmp

    Filesize

    2.7MB

  • memory/5004-55-0x00007FFE7F5F0000-0x00007FFE7F607000-memory.dmp

    Filesize

    92KB

  • memory/5004-54-0x00007FFE7F970000-0x00007FFE7F981000-memory.dmp

    Filesize

    68KB

  • memory/5004-53-0x00007FFE7FCA0000-0x00007FFE7FCB7000-memory.dmp

    Filesize

    92KB

  • memory/5004-52-0x00007FFE85390000-0x00007FFE853A8000-memory.dmp

    Filesize

    96KB