Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11/02/2025, 17:23

General

  • Target

    JaffaCakes118_e89a7e3fde0f04f5a642d8005fdd6e31.exe

  • Size

    741KB

  • MD5

    e89a7e3fde0f04f5a642d8005fdd6e31

  • SHA1

    8474c5a2cdb160ba0a85abacffbba9ffb877ad5d

  • SHA256

    68da8a52988ae5bfa45dd057a4de0868090d03de44a8c17147bfac29699f54f3

  • SHA512

    5d808b25813591b55f8c28a2b1009ef2d13444dc7ed11ec3b2e2cdca25a52d76abb2e0d788c25160af9b80ce284ab14712becc0f6f72b15346a26ce303c5ac55

  • SSDEEP

    12288:yxgI0dWJIjX6fhWpQ4rtezVzcLbVKWZr3nGBmIrGtbLLuFrv:yxgw86pWpH5e1+pKqrFJbLLuF7

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

blackzx.no-ip.biz:1000

blackzx.no-ip.biz:1100

blackzx.no-ip.org:1000

blackzx.no-ip.org:1100

192.168.1.18:1000

192.168.1.18:1100

Mutex

DC_MUTEX-JJBRJLQ

Attributes
  • InstallPath

    MSDCSC\svchost.exe

  • gencode

    LY2bPQlAggis

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

rc4.plain

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e89a7e3fde0f04f5a642d8005fdd6e31.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e89a7e3fde0f04f5a642d8005fdd6e31.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e89a7e3fde0f04f5a642d8005fdd6e31.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e89a7e3fde0f04f5a642d8005fdd6e31.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1832
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e89a7e3fde0f04f5a642d8005fdd6e31.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e89a7e3fde0f04f5a642d8005fdd6e31.exe
        3⤵
        • Modifies WinLogon for persistence
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2016
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e89a7e3fde0f04f5a642d8005fdd6e31.exe" +s +h
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2904
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e89a7e3fde0f04f5a642d8005fdd6e31.exe" +s +h
            5⤵
            • Sets file to hidden
            • System Location Discovery: System Language Discovery
            • Views/modifies file attributes
            PID:2656
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3052
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
            5⤵
            • Sets file to hidden
            • System Location Discovery: System Language Discovery
            • Views/modifies file attributes
            PID:3016
        • C:\Windows\SysWOW64\notepad.exe
          notepad
          4⤵
          • Deletes itself
          • System Location Discovery: System Language Discovery
          PID:3044
        • C:\Users\Admin\Documents\MSDCSC\svchost.exe
          "C:\Users\Admin\Documents\MSDCSC\svchost.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2868
          • C:\Users\Admin\Documents\MSDCSC\svchost.exe
            "C:\Users\Admin\Documents\MSDCSC\svchost.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2696
            • C:\Users\Admin\Documents\MSDCSC\svchost.exe
              C:\Users\Admin\Documents\MSDCSC\svchost.exe
              6⤵
              • Modifies security service
              • Windows security bypass
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Windows security modification
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • System policy modification
              PID:2084
              • C:\Windows\SysWOW64\notepad.exe
                notepad
                7⤵
                • System Location Discovery: System Language Discovery
                PID:536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\MSDCSC\svchost.exe

    Filesize

    741KB

    MD5

    e89a7e3fde0f04f5a642d8005fdd6e31

    SHA1

    8474c5a2cdb160ba0a85abacffbba9ffb877ad5d

    SHA256

    68da8a52988ae5bfa45dd057a4de0868090d03de44a8c17147bfac29699f54f3

    SHA512

    5d808b25813591b55f8c28a2b1009ef2d13444dc7ed11ec3b2e2cdca25a52d76abb2e0d788c25160af9b80ce284ab14712becc0f6f72b15346a26ce303c5ac55

  • memory/1832-36-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1832-7-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1832-3-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1832-5-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1832-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1832-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1832-13-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2016-33-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2016-25-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2016-39-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2016-38-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2016-37-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2016-69-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2016-30-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2016-29-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2016-28-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2016-27-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2016-26-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2016-34-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2016-23-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2016-67-0x0000000003940000-0x000000000394E000-memory.dmp

    Filesize

    56KB

  • memory/2016-22-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2016-66-0x0000000003940000-0x000000000394E000-memory.dmp

    Filesize

    56KB

  • memory/2552-17-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2552-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2696-93-0x0000000000230000-0x000000000023E000-memory.dmp

    Filesize

    56KB

  • memory/2868-88-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2868-83-0x00000000005E0000-0x00000000005EE000-memory.dmp

    Filesize

    56KB

  • memory/3044-58-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/3044-43-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB