Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2025, 05:39

General

  • Target

    JaffaCakes118_451942957a3e12859c8e7072e5567b7b.exe

  • Size

    922KB

  • MD5

    451942957a3e12859c8e7072e5567b7b

  • SHA1

    9b1cdd121d6042f92d340232df09d5e335f707f7

  • SHA256

    e458c0a05be86989e24bbb05802b11f6314991c937eb56069bcc019e3953dfcf

  • SHA512

    9f239945f9c6dc63bead66c20abbe1b2acfadf3a38aaa81fcbc611dc0dddce4c9a551737e0d8a63d31e7048655f60e7614918be707d7b1214ac9c003a0f867b3

  • SSDEEP

    24576:BalaUV3mShJfVh8yalaUVamSh5fVh8DxwiOCjch+c:4aUV20JfVhUaUVB05fVhUxwgsl

Malware Config

Extracted

Family

darkcomet

Botnet

marine01

C2

securehost.no-ip.org:1324

Mutex

DC_MUTEX-W06YWJM

Attributes
  • InstallPath

    system32\winlogonsrv64.exe

  • gencode

    N=FC-U4TtLwv

  • install

    true

  • offline_keylogger

    true

  • password

    cybergatefr33k()()bw""bZ!

  • persistence

    true

  • reg_key

    Winlogonsrv64

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_451942957a3e12859c8e7072e5567b7b.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_451942957a3e12859c8e7072e5567b7b.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:392
    • C:\Users\Admin\AppData\Local\Temp\Generated.exe
      "C:\Users\Admin\AppData\Local\Temp\Generated.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4872
      • C:\Windows\SysWOW64\notepad.exe
        notepad
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:3320
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\UNINSTALL.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:1988
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\SysWOW64\explorer.exe"
        3⤵
        • Windows security bypass
        • Checks BIOS information in registry
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1732
        • C:\Windows\SysWOW64\notepad.exe
          C:\Windows\SysWOW64\notepad.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Generated.exe

    Filesize

    341KB

    MD5

    0a3b8c55cab2e19518ff5bb0bc33106b

    SHA1

    81751c0b2ce5adbe01f6045154028a23978b67f1

    SHA256

    d5af5e20ea4c19ac1155ef4488a0e2e41266e111c41e7edbe643aa73f64bc39b

    SHA512

    1b7a4c3193279956378d26cfe0ec2fb647e995a52362aaf17dcf07887da64025405b51fbbc190bd8697425dd07f5fdf0f488fe35e5004187060b6d470896d319

  • C:\Users\Admin\AppData\Local\Temp\UNINSTALL.TXT

    Filesize

    40B

    MD5

    40ff21eb875ff52131dbb271de7257fc

    SHA1

    d99af161efbde2d19173c043b222e4655a95a10b

    SHA256

    f7f8cd5f5a0869a9f42c2ddacdfc300d2177c1efecf2baeea46674284a249502

    SHA512

    6cb19da344b6857c4685f52b5574df47230303c1e33a8dc11c3bef5502ac67d212b50f47cfb964b089256b4434ac5db1e3b8e54f138a449b84e28bab8804eb8b

  • memory/392-18-0x0000000074890000-0x0000000075040000-memory.dmp

    Filesize

    7.7MB

  • memory/392-1-0x0000000000540000-0x00000000005D8000-memory.dmp

    Filesize

    608KB

  • memory/392-4-0x00000000050A0000-0x0000000005132000-memory.dmp

    Filesize

    584KB

  • memory/392-5-0x0000000074890000-0x0000000075040000-memory.dmp

    Filesize

    7.7MB

  • memory/392-7-0x00000000052C0000-0x0000000005316000-memory.dmp

    Filesize

    344KB

  • memory/392-6-0x0000000004F70000-0x0000000004F7A000-memory.dmp

    Filesize

    40KB

  • memory/392-2-0x0000000005000000-0x000000000509C000-memory.dmp

    Filesize

    624KB

  • memory/392-3-0x0000000005650000-0x0000000005BF4000-memory.dmp

    Filesize

    5.6MB

  • memory/392-0-0x000000007489E000-0x000000007489F000-memory.dmp

    Filesize

    4KB

  • memory/1732-31-0x0000000013140000-0x000000001322D000-memory.dmp

    Filesize

    948KB

  • memory/1732-29-0x0000000013140000-0x000000001322D000-memory.dmp

    Filesize

    948KB

  • memory/1732-33-0x0000000013140000-0x000000001322D000-memory.dmp

    Filesize

    948KB

  • memory/1732-34-0x0000000013140000-0x000000001322D000-memory.dmp

    Filesize

    948KB

  • memory/1732-38-0x0000000013140000-0x000000001322D000-memory.dmp

    Filesize

    948KB

  • memory/1732-37-0x0000000013140000-0x000000001322D000-memory.dmp

    Filesize

    948KB

  • memory/1732-36-0x0000000013140000-0x000000001322D000-memory.dmp

    Filesize

    948KB

  • memory/3320-21-0x00000000008D0000-0x00000000008D1000-memory.dmp

    Filesize

    4KB

  • memory/4872-19-0x0000000000BD0000-0x0000000000BD1000-memory.dmp

    Filesize

    4KB

  • memory/4872-15-0x0000000013140000-0x000000001322D000-memory.dmp

    Filesize

    948KB

  • memory/4872-32-0x0000000013140000-0x000000001322D000-memory.dmp

    Filesize

    948KB

  • memory/5096-35-0x00000000008B0000-0x00000000008B1000-memory.dmp

    Filesize

    4KB