Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2025, 21:31

General

  • Target

    JaffaCakes118_7bc66c63958fc10688b8f23c108680a1.exe

  • Size

    1.3MB

  • MD5

    7bc66c63958fc10688b8f23c108680a1

  • SHA1

    65d71a5d82aa5a62a9bb0317ce9c07b123862f82

  • SHA256

    7382bab7d701e49526666ab7e32ba1e10a93f1a71ca98314ec3db8878674a092

  • SHA512

    bd2149bb69cbdb276d8a11f983a7f5bc1dccc30d5c6cd42af0f98d1bf856d28ac134459f50c2950ba0cb055c5bf2cc779553374b31307b9e9a537b8b946a57ca

  • SSDEEP

    24576:E////crXNSAoqo4vQPyagXNSAoqo4vQP9OA4aWNn/m09fKIaaBEtWq3A1Ov8Jgbb:tbgEjyITimXw

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

86.76.24.22:1604

Mutex

DC_MUTEX-F54S21D

Attributes
  • gencode

    ALGqJhQDPi9d

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7bc66c63958fc10688b8f23c108680a1.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7bc66c63958fc10688b8f23c108680a1.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:6128
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\z_plnnjc.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8638.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8637.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2440
    • C:\Users\Admin\AppData\Local\Temp\cvR7eY.exe
      "C:\Users\Admin\AppData\Local\Temp\cvR7eY.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2880
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yd3yqw7g.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4460
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES89A3.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC89A2.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4528
    • C:\Users\Admin\AppData\Local\Temp\mcduLT.exe
      "C:\Users\Admin\AppData\Local\Temp\mcduLT.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:4536
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      C:\Users\Admin\AppData\Local\Temp\svchost.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES8638.tmp

    Filesize

    1KB

    MD5

    bbd05b39a2070cceb4925fd513a9c9c0

    SHA1

    e3eb8558b9659ef3fe879136b1943d5ba1de6204

    SHA256

    23a3ce92603f7513854078916ba4899fc6edd08b05336fdf40f83f63913792e2

    SHA512

    8fd42dd417afb80ee17bb409c59eb21126b4a3b8635f252868b9a190a21d8652f300f852cfbf9ccd829d8f204d2fce100995bcd62b9d18e63668ea221403af8d

  • C:\Users\Admin\AppData\Local\Temp\RES89A3.tmp

    Filesize

    1KB

    MD5

    6ec48cbe7cdd52b4a56b1e43be99cb9b

    SHA1

    7d1db4f08815ef6826f58bf0ca8292e9e85367ef

    SHA256

    d96b7627956461b47bd0c8d5e4ddd728fee97d409bbd769ec6a0cc721ce93609

    SHA512

    179a7ed0cc58229ec3493599adda42fed9af0ce9c3a53dd74bde98c63714fb58509f2216c8e8e5caf27192a183d37894219219d0beeb35c39819b1081215971a

  • C:\Users\Admin\AppData\Local\Temp\cvR7eY.exe

    Filesize

    4KB

    MD5

    7e0c661702468e7f8cdb0a81a2dfc96e

    SHA1

    ae9233e4367974ddf0eeb06b5ad9b5e711ea2fc6

    SHA256

    e403c1054f41b45802f8d7bb0fee66616f36bcde226f26a8d8f7c61d39350ef7

    SHA512

    ebbeb07354ae452488e5ecfa20c19efcdc7c09781121ea0c80963af6e3aceb225c72e0f18867b2b0b71458b3a5c7bcadd13cb3b9f61d8206082b6e9ae0ea9018

  • C:\Users\Admin\AppData\Local\Temp\mcduLT.exe

    Filesize

    4KB

    MD5

    ffccef10057b913c4b9db0fe4deb90f7

    SHA1

    e58f58af222b48d772754514c15c8301ccdfeeb9

    SHA256

    27b4a6185c5126830c121f091fc2eb30050547a6e48d407a5e665dff20fe279d

    SHA512

    e0b867cde18be62987d345d34622377fc625767ed0c73d402883c795fef2bc170e8fc61361a398d23b0e0480fdbb8fbd6908d3111da932e2e7948a7bd7e9a7c9

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    34KB

    MD5

    e118330b4629b12368d91b9df6488be0

    SHA1

    ce90218c7e3b90df2a3409ec253048bb6472c2fd

    SHA256

    3a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9

    SHA512

    ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC8637.tmp

    Filesize

    644B

    MD5

    d81fe0f51bb82031f14ff3f5733d833b

    SHA1

    42398860ceec10b46200bb803427b7e916969094

    SHA256

    645384831b92d89bd98e496f940fc887502c74ebaa8942c86573106fa3206786

    SHA512

    7c097b3cb42ce4db4b5f9e8e68da0b96de7f1246cb299edc2b46eafd0b872ad5a79e3b7c391646bbd8ecc812026287a45da9bc46d8069c5515f7189fea458a25

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC89A2.tmp

    Filesize

    644B

    MD5

    b11f76209c1d65ededfbbd6f28a435ae

    SHA1

    24e017f6b863a665c202ece1494aed1c7f9c3356

    SHA256

    98aea6a325a28b38882e9e70640a1246cc3b5ea79ed8acc1e5c11670a4f4e10f

    SHA512

    f516e364682eae90757922cdd6913d28cd753cde47eb2f31d38bb909b8e56276fc27f12337f1c449b4b869f4f07d79efd79d1d879b06ff99e75643f9bf020d7d

  • \??\c:\Users\Admin\AppData\Local\Temp\yd3yqw7g.0.cs

    Filesize

    1KB

    MD5

    9ac2e3a8e6fb67b1ed3366f00d9d4e4f

    SHA1

    13871797a0cc50b05cff748815f2995a4bdca9e0

    SHA256

    551e346591ba5f8c361409b835efd2f7a8651cfb5af1470a2ffe731e9e92fb85

    SHA512

    21ef7cab6d1b4213e2e501f5eb9db60db331bebbf2728e5e858a235387accf0bf7b31b323c7a7d56d61375012d4d4965d85a95e23f97445c471a975471483707

  • \??\c:\Users\Admin\AppData\Local\Temp\yd3yqw7g.cmdline

    Filesize

    259B

    MD5

    06943a97352a97fa1f60f1dbec56d10c

    SHA1

    94385be1c4fae405f0e381505e1bf460ac4eeeb9

    SHA256

    2bbe9810cd30cc57d64387904b4903dd122472f736c7ad1c9161ac6f33c88a88

    SHA512

    2becdab749625ca01f2994c6db4f8dd4b5d3d2a876db30d36713227aed14d5d1c81dbd75d9d645a5d747bc2917de0deed3ccff227ac4e4ed17e03fa19ab41af3

  • \??\c:\Users\Admin\AppData\Local\Temp\z_plnnjc.0.cs

    Filesize

    1KB

    MD5

    02f61452684e4accf4f9e5148e212f7b

    SHA1

    60d26319040c40978e1f7fe9ccf9630e571c293e

    SHA256

    ee9db934c7140a05a7a30dd29b2f08395b827610101253d1583a4617c648941f

    SHA512

    5a37de0f1d68725d81bd52d92de992e47feee65ca447a9eeb6c93e1fe04b5816be08a4434f29d0d2e7c3f3cbfcd9e91e4cdb60109d4076c9be50fbe83102ed53

  • \??\c:\Users\Admin\AppData\Local\Temp\z_plnnjc.cmdline

    Filesize

    259B

    MD5

    7b15440f54b2e63b977386a53ceb8968

    SHA1

    158fec16ad87db7b848bdb977204df412cbc0b75

    SHA256

    63f97cae0e285f85446ee21a8559c14a72ab4185cbd23bfc3cc90dfdaed488ee

    SHA512

    acdd20680928619de3957cfdd359175575fc339768b083dbd7ba74200c1af020d04c59755177b09a01a056dbcab712039a1261908564175a414c8a6d4acc05cd

  • memory/2432-47-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2432-49-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2432-51-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2432-58-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2432-56-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2432-54-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2432-43-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2432-52-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/2840-15-0x0000000074FF0000-0x00000000755A1000-memory.dmp

    Filesize

    5.7MB

  • memory/2840-11-0x0000000074FF0000-0x00000000755A1000-memory.dmp

    Filesize

    5.7MB

  • memory/2880-21-0x0000000074FF0000-0x00000000755A1000-memory.dmp

    Filesize

    5.7MB

  • memory/2880-53-0x0000000074FF0000-0x00000000755A1000-memory.dmp

    Filesize

    5.7MB

  • memory/4460-35-0x0000000074FF0000-0x00000000755A1000-memory.dmp

    Filesize

    5.7MB

  • memory/4460-30-0x0000000074FF0000-0x00000000755A1000-memory.dmp

    Filesize

    5.7MB

  • memory/6128-2-0x0000000074FF0000-0x00000000755A1000-memory.dmp

    Filesize

    5.7MB

  • memory/6128-50-0x0000000074FF0000-0x00000000755A1000-memory.dmp

    Filesize

    5.7MB

  • memory/6128-1-0x0000000074FF0000-0x00000000755A1000-memory.dmp

    Filesize

    5.7MB

  • memory/6128-0-0x0000000074FF2000-0x0000000074FF3000-memory.dmp

    Filesize

    4KB