Analysis

  • max time kernel
    142s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2025, 21:31

General

  • Target

    JaffaCakes118_7bc66c63958fc10688b8f23c108680a1.exe

  • Size

    1.3MB

  • MD5

    7bc66c63958fc10688b8f23c108680a1

  • SHA1

    65d71a5d82aa5a62a9bb0317ce9c07b123862f82

  • SHA256

    7382bab7d701e49526666ab7e32ba1e10a93f1a71ca98314ec3db8878674a092

  • SHA512

    bd2149bb69cbdb276d8a11f983a7f5bc1dccc30d5c6cd42af0f98d1bf856d28ac134459f50c2950ba0cb055c5bf2cc779553374b31307b9e9a537b8b946a57ca

  • SSDEEP

    24576:E////crXNSAoqo4vQPyagXNSAoqo4vQP9OA4aWNn/m09fKIaaBEtWq3A1Ov8Jgbb:tbgEjyITimXw

Malware Config

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Extracted

Family

darkcomet

Botnet

Guest16

C2

86.76.24.22:1604

Mutex

DC_MUTEX-F54S21D

Attributes
  • gencode

    ALGqJhQDPi9d

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7bc66c63958fc10688b8f23c108680a1.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7bc66c63958fc10688b8f23c108680a1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lyxpqfzw.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBBC2.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCBBC1.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2328
    • C:\Users\Admin\AppData\Local\Temp\cvR7eY.exe
      "C:\Users\Admin\AppData\Local\Temp\cvR7eY.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2540
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jjlwrecb.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBE41.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCBE40.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2836
    • C:\Users\Admin\AppData\Local\Temp\mcduLT.exe
      "C:\Users\Admin\AppData\Local\Temp\mcduLT.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2964
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      C:\Users\Admin\AppData\Local\Temp\svchost.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESBBC2.tmp

    Filesize

    1KB

    MD5

    967673d9de538ae22e2d1876301b506c

    SHA1

    7c5a887999f0c53245f64bca6bb2083c7afcf6cc

    SHA256

    0dcdc479d5303679c85d6a206e0f4c5f5a83b4da0eabbe6517a7855c9cf82ae2

    SHA512

    ee865891eefed81aa3e3fd66fa35531583ce245fb6710cf748515a260d53698b5369f47ef9a9fe4a344802b287fb50a597c92fef446a4c0aa8c4c1fbf12fbfb7

  • C:\Users\Admin\AppData\Local\Temp\RESBE41.tmp

    Filesize

    1KB

    MD5

    afc054c9f2a63ab4d0db72d29c040b9c

    SHA1

    7461829a8c01054e5ba20318acf52ce541ee26a9

    SHA256

    5e4cd35515cbcf72612f4af7ad9b699d688c298a2d9af51730053b6ec150f1b1

    SHA512

    d8c4f514c8fa61aa66663e083cfe9b7df5e5616d139d5aa6d7628fdde588960308f0306b4c4b759eca5f31cf7a0426e031316fb3c55863b24bd102e81ffad542

  • C:\Users\Admin\AppData\Local\Temp\cvR7eY.exe

    Filesize

    4KB

    MD5

    62c971dd8a35489471e3ba04f0947c5b

    SHA1

    b33d73e92d7725864aaf12a3bf154ba0b1d87168

    SHA256

    b37066d1e09528dd091cbdb954e3bcd0c43cb6dbbc70596c51549cf8c7aa3f85

    SHA512

    997cb6f65d73c0ab7d0be0b234a63041919e29bde7883517933fa2cd59d8de344f1741c4f89b256e401bf8cf6e4390b91af230f37250082a5e3ff6b0d7bcb70b

  • C:\Users\Admin\AppData\Local\Temp\mcduLT.exe

    Filesize

    4KB

    MD5

    04c7d7d133ca52bb74bb5b3ec384f46b

    SHA1

    620d779ba9d47262fb14c79e15a706e48d46575d

    SHA256

    a8ecd46c0697c27af6cd76faa4346a716946e70a4ed3395b43aa35da303552d5

    SHA512

    a3666e4c1784ba434779ecc30cb71cc3020f2ff3a03e63f2fd56a24fd5efbc35c82adf223a8728b2db701a73105dd6419fbd423474025d2a51110d03aca94d3d

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCBBC1.tmp

    Filesize

    644B

    MD5

    d81fe0f51bb82031f14ff3f5733d833b

    SHA1

    42398860ceec10b46200bb803427b7e916969094

    SHA256

    645384831b92d89bd98e496f940fc887502c74ebaa8942c86573106fa3206786

    SHA512

    7c097b3cb42ce4db4b5f9e8e68da0b96de7f1246cb299edc2b46eafd0b872ad5a79e3b7c391646bbd8ecc812026287a45da9bc46d8069c5515f7189fea458a25

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCBE40.tmp

    Filesize

    644B

    MD5

    b11f76209c1d65ededfbbd6f28a435ae

    SHA1

    24e017f6b863a665c202ece1494aed1c7f9c3356

    SHA256

    98aea6a325a28b38882e9e70640a1246cc3b5ea79ed8acc1e5c11670a4f4e10f

    SHA512

    f516e364682eae90757922cdd6913d28cd753cde47eb2f31d38bb909b8e56276fc27f12337f1c449b4b869f4f07d79efd79d1d879b06ff99e75643f9bf020d7d

  • \??\c:\Users\Admin\AppData\Local\Temp\jjlwrecb.0.cs

    Filesize

    1KB

    MD5

    9ac2e3a8e6fb67b1ed3366f00d9d4e4f

    SHA1

    13871797a0cc50b05cff748815f2995a4bdca9e0

    SHA256

    551e346591ba5f8c361409b835efd2f7a8651cfb5af1470a2ffe731e9e92fb85

    SHA512

    21ef7cab6d1b4213e2e501f5eb9db60db331bebbf2728e5e858a235387accf0bf7b31b323c7a7d56d61375012d4d4965d85a95e23f97445c471a975471483707

  • \??\c:\Users\Admin\AppData\Local\Temp\jjlwrecb.cmdline

    Filesize

    259B

    MD5

    9b40b6b6ea311db68d89495a6b8a568b

    SHA1

    2aefd1a673db83bed18daf6eb9ed999c7457a7a2

    SHA256

    d4e62dbce591eb780bd102503c3902d72580ef092a530aa7dac405183f2a3761

    SHA512

    9557f2fec2b7be11ac933612189105619f22fe9742f40c2872fc8b25629026895aaf0ac5c9c8c64fe270f4c6c68feeb9dd0afccd564a50728a3522a469a457a3

  • \??\c:\Users\Admin\AppData\Local\Temp\lyxpqfzw.0.cs

    Filesize

    1KB

    MD5

    02f61452684e4accf4f9e5148e212f7b

    SHA1

    60d26319040c40978e1f7fe9ccf9630e571c293e

    SHA256

    ee9db934c7140a05a7a30dd29b2f08395b827610101253d1583a4617c648941f

    SHA512

    5a37de0f1d68725d81bd52d92de992e47feee65ca447a9eeb6c93e1fe04b5816be08a4434f29d0d2e7c3f3cbfcd9e91e4cdb60109d4076c9be50fbe83102ed53

  • \??\c:\Users\Admin\AppData\Local\Temp\lyxpqfzw.cmdline

    Filesize

    259B

    MD5

    3c381da5fe3ee64dc7d14a2e3414e98a

    SHA1

    b4b3f64e7cb72b580ff99474d798c166de60c959

    SHA256

    f8023ab2dc6e81a3234f6d8db1b25718a2199bd8fcb821c00aa2671ddceccb91

    SHA512

    8f2aef007c32bf5f592088974aa8b889d1024440453e9e330ece3fd6845843620c653e8a8368510617d472f1f7de9d23d0e27297fdceea1e156070495436f615

  • \Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    31KB

    MD5

    ed797d8dc2c92401985d162e42ffa450

    SHA1

    0f02fc517c7facc4baefde4fe9467fb6488ebabe

    SHA256

    b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e

    SHA512

    e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2

  • memory/2640-8-0x0000000074F60000-0x000000007550B000-memory.dmp

    Filesize

    5.7MB

  • memory/2640-15-0x0000000074F60000-0x000000007550B000-memory.dmp

    Filesize

    5.7MB

  • memory/2840-43-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2840-60-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2840-69-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2840-67-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2840-51-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2840-55-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2840-64-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2840-65-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2840-66-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2840-57-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2840-59-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2840-53-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2840-50-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2840-48-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2840-45-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/3060-2-0x0000000074F60000-0x000000007550B000-memory.dmp

    Filesize

    5.7MB

  • memory/3060-62-0x00000000004A0000-0x00000000005A0000-memory.dmp

    Filesize

    1024KB

  • memory/3060-63-0x0000000074F60000-0x000000007550B000-memory.dmp

    Filesize

    5.7MB

  • memory/3060-0-0x0000000074F61000-0x0000000074F62000-memory.dmp

    Filesize

    4KB

  • memory/3060-1-0x0000000074F60000-0x000000007550B000-memory.dmp

    Filesize

    5.7MB