Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2025, 13:34

General

  • Target

    JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe

  • Size

    3.0MB

  • MD5

    b78e98368bf87ce58b2aae9a26e1ac3e

  • SHA1

    67a746bed23cb4fc97d8f2a542b78bf1ef3a539f

  • SHA256

    2eb3ac2d64ce7ccf86f15f751093f6a3d2b9b83d637acba8d95c45ea47cc97dc

  • SHA512

    e4249cd918a82a01896f31f7fb1958ce5539d5466e46cf21f7ad29d95b5de23e04d5f517f417fbc03ae8acbc0d5a8b7c0bfa9c1a19996fb569bfe52e8e12b7bf

  • SSDEEP

    49152:0Dm5cit6FHMoDUM5n62s1JHy48m3KCnCc7NieDm5cit6FHMoDUM5n62s1J:

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

rattcody.zapto.org:20111

codylegge.zapto.org:20111

codylegge.zapto.org:1064

codylegge.zapto.org:1604

192.168.2.11:20111

142.162.41.160:20111

127.0.0.1:20111

Mutex

DC_MUTEX-GK1MTGJ

Attributes
  • gencode

    6wlfzgB-CUtT

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Drops file in Drivers directory 7 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b78e98368bf87ce58b2aae9a26e1ac3e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Users\Admin\AppData\Local\Temp\PvpLogger.exe
      "C:\Users\Admin\AppData\Local\Temp\PvpLogger.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2004
    • C:\Users\Admin\AppData\Local\Temp\AccSteal.exe
      "C:\Users\Admin\AppData\Local\Temp\AccSteal.exe"
      2⤵
      • Modifies firewall policy service
      • Modifies security service
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Windows security modification
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1792
    • C:\Users\Admin\AppData\Local\Temp\Minecraft cracked.exe
      "C:\Users\Admin\AppData\Local\Temp\Minecraft cracked.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Users\Admin\AppData\Local\Temp\Minecraft Beta Cracked.exe
        "C:\Users\Admin\AppData\Local\Temp\Minecraft Beta Cracked.exe"
        3⤵
        • Executes dropped EXE
        PID:2732
      • C:\Users\Admin\AppData\Local\Temp\Neptune.exe
        "C:\Users\Admin\AppData\Local\Temp\Neptune.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Users\Admin\AppData\Roaming\iexplorer.exe
          "C:\Users\Admin\AppData\Roaming\iexplorer.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetWindowsHookEx
          PID:1660
    • C:\Users\Admin\AppData\Local\Temp\Test.exe
      "C:\Users\Admin\AppData\Local\Temp\Test.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2892
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
          4⤵
          • Sets file to hidden
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2788
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
          4⤵
          • Sets file to hidden
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2816
      • C:\Windows\SysWOW64\drivers\wathehell.exe
        "C:\Windows\system32\drivers\wathehell.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2948
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2140
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 568
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AccSteal.exe

    Filesize

    723KB

    MD5

    d916d7795add080820d7e87ea8b261e2

    SHA1

    5fed290a2498a8e669cd51f2e03236fad5764677

    SHA256

    8c82ed13d96fa7a79c95d379bafd0a8b2591104ff56c177234fc51383a45bd54

    SHA512

    d269fa7d8a2003810dd860561e68165af42fbf6f30e5a6c3e85445b61beb81925158f662100eaebdabf4b9102b9cf1bf0cfaec0e43e3812b5b848e665b963805

  • C:\Users\Admin\AppData\Local\Temp\Minecraft Beta Cracked.exe

    Filesize

    264KB

    MD5

    775be9fc70f3d88be71fdb6b2aa13ce3

    SHA1

    5137cef635dedeb1ab9c3bc9a96a13834ebf11a8

    SHA256

    bfb73b766f4089bc2574b77e20301098b555b5615c1a05f4063beb2b38d9d0e5

    SHA512

    0819da75d5d7ff5eb7c674b08c92aa15723e4c7de70e2a1d616bfca5e65a6f7efb8a71689280a6f37ef2711f29e90d3743225ea76bab68107787eaf1010c0ebc

  • C:\Users\Admin\AppData\Local\Temp\Minecraft cracked.exe

    Filesize

    420KB

    MD5

    2a0a7183c2549249cf70ff0b5335dac5

    SHA1

    681ea72f2cbe7e987a5ac4fa9e78f1300a8c8092

    SHA256

    387042278c3bd7a28bbf04d99107add76be4502d41f2fc78b5d83796f06ac9ba

    SHA512

    0c82c7985562d0b76d42b5d392c71207ccf0b960a61225cdb815795e17f03b8827d17bfcc6d83e785eee1fa913efdd541e1bcddeb513c1663a10ac12c1dcf7ac

  • C:\Users\Admin\AppData\Local\Temp\Neptune.exe

    Filesize

    37KB

    MD5

    db278eb42172e3b2c7d711e3c8e3185e

    SHA1

    9334855b513276e518f4c678f03e7c2eeef1d59c

    SHA256

    d1e86771c8327c88a3900b0b96bb018c2826591279daa0dbe000d52401990477

    SHA512

    b7b7f3d35d16a4b15a096fbbcec48f024a8f7abe0890d28f8eb1ac4ab742f413566540dd32dfc2680428c63e1c73f00427a28ca4cc04e978eb782837f0cf67ae

  • C:\Users\Admin\AppData\Local\Temp\PvpLogger.exe

    Filesize

    340KB

    MD5

    98f9120cda137603e3d3e0d1f693b981

    SHA1

    fbb58808f924656915018d22dd370cf997baa41e

    SHA256

    2c19eb0b2a26c954f4495fd9ffbc69679bf516f6df5da2adb6d37695cc8d5f8a

    SHA512

    5449b79efe72746fd3833f2a5b082a372615757cc9ae4205002056554188a6d952577982305878d9c3aafab270020c2b34bfd43d86daae76f0c9db7f70182d47

  • C:\Users\Admin\AppData\Local\Temp\Test.exe

    Filesize

    821KB

    MD5

    07ba64de2e604a68edf7f5b509b2917d

    SHA1

    8f06d8887a53af5946ab9f3a5098a909d800aa01

    SHA256

    670528979c35d038809f30e04a4accb9999431721fa674f3834504d1bc29d2d2

    SHA512

    76afdf1677199e525b21ce9906cf2923bf57b3fb5e6ed4addb0014b63994ed80e48c93cf10a2d0e689f55007f9e2f93dd64d6b502cd9190d61185079ca116f1c

  • C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat

    Filesize

    59B

    MD5

    757345e3b6e815a4393257a58d767f13

    SHA1

    0e9b0cd4d0e0472ca222f9a07f0ade2b09552f59

    SHA256

    a8f5b48fdc006e90d5442419c6bbb53e9087b33131edb7c41d93e216bcf444c4

    SHA512

    7dba092736a2e9392a571e54003127398e81a51f3e8d8fe846382e236d5bd3390dc8e441aed040007bf8742c9355f82b3d8072e9b0dfe4f3f50801fbd87b7509

  • C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat

    Filesize

    50B

    MD5

    b774ae3fb1da087e1f83b4f7b2060e5a

    SHA1

    97eb9be49ac3af9c851c9e1e84e32bfd53e325a8

    SHA256

    adaf4a84b41e410b02e261cfd0fe7739d98647eab73c3badd32ac6e39f26351b

    SHA512

    f75d0f95f7306d26a12b414bfe37b97fbd37546cb3c6e403def7077329ddffb4b45d5c5f0ba0e7bb6d72851d2d691b0a85267beead42f7cbf2e8c3d45a3b4701

  • C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat

    Filesize

    58B

    MD5

    9e15745f4ec21d0c4769ab76904533c9

    SHA1

    4b9e4ee53e7e5ff8e199bdf160822525ab848384

    SHA256

    228e99fc1a1db4754f9aff092de05b58bf5b692dbd00b27fa41590dc63f683c5

    SHA512

    fca7d72c03a846c4553f6d6e3d6572badc17101f345c05fb793f4fdd61cfdc9fa74843c6e99cd9b8bcc90449c8c6f6fcf2c8a9babad733ab6b741b1334e104d3

  • memory/768-37-0x000007FEF5DF0000-0x000007FEF678D000-memory.dmp

    Filesize

    9.6MB

  • memory/768-0-0x000007FEF60AE000-0x000007FEF60AF000-memory.dmp

    Filesize

    4KB

  • memory/1792-107-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/1792-106-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/1792-113-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/1792-112-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/1792-101-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/1792-102-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/1792-103-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/1792-104-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/1792-105-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/1792-97-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/1792-111-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/1792-108-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/1792-109-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/1792-110-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2740-73-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/2948-100-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/2948-98-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB