Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/02/2025, 10:58

General

  • Target

    JaffaCakes118_b64c82d841f0ca478ee4b052973ec8de.exe

  • Size

    1.2MB

  • MD5

    b64c82d841f0ca478ee4b052973ec8de

  • SHA1

    1d6b7f8243fff0e5cd771e999c9098423e99eeb1

  • SHA256

    32c7f3af9df7f9d50047f168e069bd4e06122efe825db2dd0fae34e2c05ce9ab

  • SHA512

    1d9bfe0e21a6c1639eaa908fef16d3d6777fd0fb08ccd3c014600449fb5df8977fa58986a2afa49c4971b18f63ab802fa779d70e78d4fc3da7314dfbe5c38623

  • SSDEEP

    12288:/V9QZXi5ITtw8xqm8LlO5/8h4+9Ymoxefl5QT5VVpJ5PCf/BPEsKZXCa6jpoLuJl:UTtNkoxBUJjTH6FyTKJ49HGjNA

Malware Config

Extracted

Family

darkcomet

Botnet

DEVILSKARTEL

C2

murdak.no-ip.org:100

Mutex

DC_MUTEX-D4UU794

Attributes
  • InstallPath

    MICROSOFTUPDATE.exe

  • gencode

    oF.s0Pyx7UWi

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b64c82d841f0ca478ee4b052973ec8de.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b64c82d841f0ca478ee4b052973ec8de.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4500
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\6zs_r0wq.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1580
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES91B1.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAB6D7B9AE00A48DBB312B88A2E6ADE79.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2956
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\JaffaCakes118_b64c82d841f0ca478ee4b052973ec8de.exe
      C:\Users\Admin\AppData\Local\Microsoft\Windows\JaffaCakes118_b64c82d841f0ca478ee4b052973ec8de.exe
      2⤵
      • Modifies WinLogon for persistence
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:844
      • C:\Windows\SysWOW64\MICROSOFTUPDATE.exe
        "C:\Windows\system32\MICROSOFTUPDATE.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1480
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\aec4ebcz.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2088
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9654.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF42CE9467354423B995972FFE349D0.TMP"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:868
        • C:\Users\Admin\AppData\Local\Microsoft\Windows\MICROSOFTUPDATE.exe
          C:\Users\Admin\AppData\Local\Microsoft\Windows\MICROSOFTUPDATE.exe
          4⤵
          • Modifies WinLogon for persistence
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4612
          • C:\Windows\SysWOW64\MICROSOFTUPDATE.exe
            "C:\Windows\system32\MICROSOFTUPDATE.exe"
            5⤵
            • Executes dropped EXE
            PID:3124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\JaffaCakes118_b64c82d841f0ca478ee4b052973ec8de.exe

    Filesize

    1024B

    MD5

    54b1c45da8980b32759042e2c3c78dfb

    SHA1

    11e8bc2db98786c69e5dadf53d00ff3ee03d64f8

    SHA256

    9d5efce48ed68dcb4caaa7fbecaf47ce2cab0a023afc6ceed682d1d532823773

    SHA512

    73169989b97a032fe923272fbe4bc27be77e491d125b360120fc1e02419d99f807b1f62a3edaff85ebfd16e9c240ec295be9431cfe4d6c353f0cf0dbeec4d2ac

  • C:\Users\Admin\AppData\Local\Temp\6zs_r0wq.0.vb

    Filesize

    682B

    MD5

    d75bfbe0fa5d960574a8efc837185f48

    SHA1

    cea7f249ae87d69c4915dbe2159b6c53091a7b4a

    SHA256

    ef55874d0838b3194bcf3828381c132229825db8c638002bed8402f235e45625

    SHA512

    02924da7fa09e20ca59dcd6557b1f6d0a016b302f42ee0ec15fa9d080c0476afec19c84622fa496ad02a58b60fa7bdc3fd5305b1401426f0e014fbda9edf076f

  • C:\Users\Admin\AppData\Local\Temp\6zs_r0wq.cmdline

    Filesize

    246B

    MD5

    0f52c5a527c65b9eee183534f3cac37a

    SHA1

    e083fc908ec681ccb8a30e65cc615d1684e5b720

    SHA256

    2c226f0f695c417228b92bb45579edc99d06f0c3e7bc74f6025829ec641e547f

    SHA512

    4cdcfdfcdf95e824c3db8c81a60e2639bd738148f50114f0c02a0d61f7d21ab3f5ef03597ef19959f33f52e5fecaf9e8ffa1948f530bd5fb9851e8f46b0c6213

  • C:\Users\Admin\AppData\Local\Temp\6zs_r0wq.dll

    Filesize

    6KB

    MD5

    377a4d7e6cc0ac609d756fe1d5768bd6

    SHA1

    ba50f99cbbb6cc70f235c337f22c9220dfce394c

    SHA256

    2dc96ca68bdda4516934113c48b9698a84969ca4653da91bb47849afe1f28e37

    SHA512

    82225248a01c59940dadb3996023a8fb7ccfccb3ad54cebb5e80fbdb7270cb8930c26d63aee3b82224e6de688dc404268f2ba00676d4d2ad3096697c84d540c5

  • C:\Users\Admin\AppData\Local\Temp\RES91B1.tmp

    Filesize

    1KB

    MD5

    212751e649650a814d05de75ac1a8542

    SHA1

    43f222a5f1881d45116a4c8eb77b24fb6975a7ce

    SHA256

    e346f358fd88e1f62a12c09997d013fd8c4a634ef117ce77ab0381212e65692a

    SHA512

    e07247d655d21a4522709d82225c7c6b33be1edaa6d4a301664f1a15610d4211194bfbc7a1f3f651a3f79dfddbe43dde9408596fa6983d77b6f073b39bf660ae

  • C:\Users\Admin\AppData\Local\Temp\RES9654.tmp

    Filesize

    1KB

    MD5

    87346a8a55659211c432a420eb550d1c

    SHA1

    5ac11c2b23333349316492b35a25a7ea6da8e45a

    SHA256

    3c7d4e7bec61b1d5d628d968eb832c2dc4f146b717db579643fec50234e5f454

    SHA512

    f6972fb707172b3d8abfc30c999af3aeb16d57470611b48d6cbada596bdf7414692e4871df623285d74dd24df59dd9f9cca4a643ce92a7140a2bde36b4e5923d

  • C:\Users\Admin\AppData\Local\Temp\aec4ebcz.cmdline

    Filesize

    246B

    MD5

    8bb01aab974e78e84124856642549252

    SHA1

    0986ebf7513414ceefbcc0c980fb128ba58732df

    SHA256

    103cdc5ef14e53a6e238c743ec2ef69a00802a988332dad32385377a2fa7e3a4

    SHA512

    b09402ee3890e0bfca7dec8080e9c01536c4265d3eb5bb20ec11622a40c5b3a3e97a4e25698b09a26ee1950adaefc318d46d3117eb8739c0441293cb1e0a28a0

  • C:\Users\Admin\AppData\Local\Temp\aec4ebcz.dll

    Filesize

    6KB

    MD5

    f0950d706a8eabd43d344f5962d590e1

    SHA1

    5f520ac96a41d8b5c99eaaeaf566c4fcaccb68ef

    SHA256

    688a198728ba0b00c34762d815c8c0e2bd4ab4f5f5cb07aaa098deddc6b8fd5d

    SHA512

    58ab10b535c4c1ef0d4cdbb2f2219c9e6fe124912df26fb54f56324f7e92487ae767363a62f437bb52c0fff7869766f09c1ba21e35793a87f1416f2a278d10d1

  • C:\Users\Admin\AppData\Local\Temp\vbcAB6D7B9AE00A48DBB312B88A2E6ADE79.TMP

    Filesize

    652B

    MD5

    1a085d3094413c264b5ed98328ea628d

    SHA1

    0bb696f7111cc7b5f34da9f48ea7cd900417699a

    SHA256

    9e54afe2ec5b972a58d298cc9e717b6846d6b11d66e76e4ca0042f2ea6693501

    SHA512

    6f5b46bf17e92c4d5ada69cb8959f86da72a12765b8cf524c185f2fc6a22919edb5740988377aff8f2ea80bb39cbc7630d25cbeaa4e8ce023bd8f148b58847d5

  • C:\Users\Admin\AppData\Local\Temp\vbcF42CE9467354423B995972FFE349D0.TMP

    Filesize

    652B

    MD5

    239138bf127862e495c610ed7657740d

    SHA1

    53e2c14f3859ccb9a39ccd5bae16e20c9097e66f

    SHA256

    60e95936869f15afc28b7d1f4a859e4c206c018757b6eabd4c541dcfe674fc53

    SHA512

    69cd690477808c62d03423854733da5ebcc58212f5be7db0f2d02f1501c7bb0377c8da5825ceda6f334389294709c8c8df1ea6086120c63a828a17be51999519

  • C:\Users\Admin\AppData\Local\Temp\wmpnetk.exe

    Filesize

    1.1MB

    MD5

    d881de17aa8f2e2c08cbb7b265f928f9

    SHA1

    08936aebc87decf0af6e8eada191062b5e65ac2a

    SHA256

    b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0

    SHA512

    5f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34

  • C:\Windows\SysWOW64\MICROSOFTUPDATE.exe

    Filesize

    1.2MB

    MD5

    b64c82d841f0ca478ee4b052973ec8de

    SHA1

    1d6b7f8243fff0e5cd771e999c9098423e99eeb1

    SHA256

    32c7f3af9df7f9d50047f168e069bd4e06122efe825db2dd0fae34e2c05ce9ab

    SHA512

    1d9bfe0e21a6c1639eaa908fef16d3d6777fd0fb08ccd3c014600449fb5df8977fa58986a2afa49c4971b18f63ab802fa779d70e78d4fc3da7314dfbe5c38623

  • memory/844-23-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/844-45-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/844-29-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/844-32-0x0000000002290000-0x0000000002291000-memory.dmp

    Filesize

    4KB

  • memory/844-26-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/844-31-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1480-47-0x0000000001560000-0x0000000001570000-memory.dmp

    Filesize

    64KB

  • memory/1580-7-0x0000000074660000-0x0000000074C11000-memory.dmp

    Filesize

    5.7MB

  • memory/1580-16-0x0000000074660000-0x0000000074C11000-memory.dmp

    Filesize

    5.7MB

  • memory/4500-0-0x0000000074662000-0x0000000074663000-memory.dmp

    Filesize

    4KB

  • memory/4500-28-0x0000000074660000-0x0000000074C11000-memory.dmp

    Filesize

    5.7MB

  • memory/4500-2-0x0000000074660000-0x0000000074C11000-memory.dmp

    Filesize

    5.7MB

  • memory/4500-1-0x0000000074660000-0x0000000074C11000-memory.dmp

    Filesize

    5.7MB

  • memory/4612-73-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/4612-83-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB