Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/02/2025, 10:40

General

  • Target

    JaffaCakes118_c22a33bf182739b3333637d8aeefa468.exe

  • Size

    853KB

  • MD5

    c22a33bf182739b3333637d8aeefa468

  • SHA1

    4231b9143d8d7e4888c5b5bcfc8a7f3915a33987

  • SHA256

    e1c0b4985deead531b5379b428ed6b52979b304772cad99322e0b8c770229274

  • SHA512

    f58ec7a7a614d33c3f06252f66abaea1296882f9ab1ed599ca9c9d83fd977173ffb32dd2ad48683ee124412ccf0ce03658be06e00c716cb94d42befae7c747d1

  • SSDEEP

    24576:8pZ4XeLKWl4aotjbpR1BYeIojQXfvqc7Uim7:8pZ4XeLKw4aobNYe32fvqc7Ui

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

94.23.183.133:1604

Mutex

DC_MUTEX-F54S21D

Attributes
  • gencode

    6N*#iN2$4-Kj

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Downloads MZ/PE file 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c22a33bf182739b3333637d8aeefa468.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c22a33bf182739b3333637d8aeefa468.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Users\Admin\AppData\Local\Temp\Explorer.exe
      "C:\Users\Admin\AppData\Local\Temp\Explorer.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3360
      • C:\Users\Admin\AppData\Local\Temp\cvtres.exe
        C:\Users\Admin\AppData\Local\Temp\cvtres.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2536
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4MzAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTE0Njg3NjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjYyNDE1OTgxIi8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:1180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Explorer.exe

    Filesize

    764KB

    MD5

    7ce1a5dbba4c3cf72b6d0642ddf64569

    SHA1

    cc3a927caa033b6a06d75e61fa973f9600024eaf

    SHA256

    88a3d3a36ce5d49a400d6b702caa6cb95ed0b3e4f1d78bd2f465cc01d431707d

    SHA512

    9f685acce7e18d20f84bb810db84135d1394476511e8359650bde936f1024237c1a474c71d39b5c5db99e61e02feb84c21941973bb808a4cbf9644b1fba2f36c

  • C:\Users\Admin\AppData\Local\Temp\cvtres.exe

    Filesize

    34KB

    MD5

    e118330b4629b12368d91b9df6488be0

    SHA1

    ce90218c7e3b90df2a3409ec253048bb6472c2fd

    SHA256

    3a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9

    SHA512

    ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0

  • memory/1320-1-0x00000000741A0000-0x0000000074751000-memory.dmp

    Filesize

    5.7MB

  • memory/1320-2-0x00000000741A0000-0x0000000074751000-memory.dmp

    Filesize

    5.7MB

  • memory/1320-31-0x00000000741A0000-0x0000000074751000-memory.dmp

    Filesize

    5.7MB

  • memory/1320-0-0x00000000741A2000-0x00000000741A3000-memory.dmp

    Filesize

    4KB

  • memory/2536-24-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/2536-32-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/2536-27-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/2536-26-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/2536-22-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/2536-47-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/2536-17-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/2536-35-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/2536-29-0x0000000000780000-0x0000000000781000-memory.dmp

    Filesize

    4KB

  • memory/2536-20-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/2536-28-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/3360-33-0x00000000741A0000-0x0000000074751000-memory.dmp

    Filesize

    5.7MB

  • memory/3360-14-0x00000000741A0000-0x0000000074751000-memory.dmp

    Filesize

    5.7MB

  • memory/3360-25-0x00000000741A0000-0x0000000074751000-memory.dmp

    Filesize

    5.7MB