Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/02/2025, 21:43

General

  • Target

    JaffaCakes118_1568979aa97ea900d70140aca3bdeaa0.exe

  • Size

    710KB

  • MD5

    1568979aa97ea900d70140aca3bdeaa0

  • SHA1

    998188bb68a7c427b36b49b764d6270bb08b7303

  • SHA256

    92ac5cfeb92d54c5a7157c51ebec60fd436713727c21442bac145b8a6e4feb5a

  • SHA512

    e8fae5ae7f9e6fa07d5c45aa684fb393604e17eb6fa43acd0c962b741230bb49744a7b7edec72d02f50a2a9ba385da6cefd0059623fffa3c42aa789f983e3e63

  • SSDEEP

    12288:jZcSfzt2RxPaCcqo2E8v5+gerCsMNgn4Kry/6gTNnJq:jGSfkRx33E8vsdZMNP6gTNJ

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16_min

C2

nikki.no-ip.biz:6666

Mutex

DCMIN_MUTEX-CBPZZV7

Attributes
  • InstallPath

    DCSCMIN\IMDCSC.exe

  • gencode

    KRH5wjjVc6Sx

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    DarkComet RAT

rc4.plain

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1568979aa97ea900d70140aca3bdeaa0.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1568979aa97ea900d70140aca3bdeaa0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1568979aa97ea900d70140aca3bdeaa0.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1568979aa97ea900d70140aca3bdeaa0.exe
      2⤵
      • Modifies WinLogon for persistence
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe
        "C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe
          C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe
          4⤵
            PID:1664

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe

      Filesize

      710KB

      MD5

      1568979aa97ea900d70140aca3bdeaa0

      SHA1

      998188bb68a7c427b36b49b764d6270bb08b7303

      SHA256

      92ac5cfeb92d54c5a7157c51ebec60fd436713727c21442bac145b8a6e4feb5a

      SHA512

      e8fae5ae7f9e6fa07d5c45aa684fb393604e17eb6fa43acd0c962b741230bb49744a7b7edec72d02f50a2a9ba385da6cefd0059623fffa3c42aa789f983e3e63

    • memory/1928-19-0x00000000747B0000-0x0000000074D5B000-memory.dmp

      Filesize

      5.7MB

    • memory/1928-1-0x00000000747B0000-0x0000000074D5B000-memory.dmp

      Filesize

      5.7MB

    • memory/1928-2-0x00000000747B0000-0x0000000074D5B000-memory.dmp

      Filesize

      5.7MB

    • memory/1928-3-0x00000000747B0000-0x0000000074D5B000-memory.dmp

      Filesize

      5.7MB

    • memory/1928-0-0x00000000747B1000-0x00000000747B2000-memory.dmp

      Filesize

      4KB

    • memory/2684-10-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/2684-21-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/2684-15-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2684-14-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/2684-13-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/2684-12-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/2684-17-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/2684-8-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/2684-11-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/2684-6-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/2684-20-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/2684-18-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/2684-23-0x00000000000C0000-0x00000000000C1000-memory.dmp

      Filesize

      4KB

    • memory/2684-22-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/2684-4-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/2684-34-0x0000000000400000-0x00000000004B2000-memory.dmp

      Filesize

      712KB

    • memory/2772-32-0x0000000074100000-0x00000000746AB000-memory.dmp

      Filesize

      5.7MB

    • memory/2772-31-0x0000000074101000-0x0000000074102000-memory.dmp

      Filesize

      4KB

    • memory/2772-33-0x0000000074100000-0x00000000746AB000-memory.dmp

      Filesize

      5.7MB

    • memory/2772-35-0x0000000074100000-0x00000000746AB000-memory.dmp

      Filesize

      5.7MB

    • memory/2772-36-0x0000000074100000-0x00000000746AB000-memory.dmp

      Filesize

      5.7MB