Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24/03/2025, 02:38

General

  • Target

    JaffaCakes118_8854848a600589da4c3f738a8958ee62.exe

  • Size

    664KB

  • MD5

    8854848a600589da4c3f738a8958ee62

  • SHA1

    b47f082d3938fb97008518e8d1aedf12c34cac32

  • SHA256

    6fda0fd3839b1877b2a675d09ec1438734131c881a5e2c00a18b487f18fae100

  • SHA512

    9a1d0b4d395fd51081e47065e51e1555d7cbf08c2885b72d33594fa5f4ce2727bba0a5e66628d18733a3da9fae37d2dcf90eb8b8dd6fdc0d974adcb51886eb9e

  • SSDEEP

    12288:F9AFlAd0Z+89cxTGzO4AucTD8QP2lmFSrVs9LqRKyh:jAQ6Zx9cxTmOrucTIEFSpOGzh

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

Mutex

DC_MUTEX-F54S21D

Attributes
  • InstallPath

    Windupdt\winupdate.exe

  • gencode

    s�=04$chbreo

  • install

    true

  • offline_keylogger

    false

  • persistence

    true

  • reg_key

    winupdater

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8854848a600589da4c3f738a8958ee62.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8854848a600589da4c3f738a8958ee62.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\SysWOW64\notepad.exe
      notepad
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:2664
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Checks BIOS information in registry
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Demo.txt

    Filesize

    671B

    MD5

    fdda412125473a423d8717100c017467

    SHA1

    5f8fd28a02d3e2666c5722fcddcfa42d293f6f21

    SHA256

    61f72d568285ecf85fa3c76f573f81cc0dd171b1aaf90a1e8d055125fe94ea9b

    SHA512

    3e7a59b93e058d1457c21dc7e3af6528f7fadb52f689f278e750b5c4d2aa814caba55b17527c33d67e958f289561507ee0086699a2220dee72a2871f88846e44

  • C:\Users\Admin\AppData\Local\Temp\eula.1031.txt

    Filesize

    8B

    MD5

    9c2e0f7e7d68872e307cb8f9f08f2a42

    SHA1

    e675da7ea97a95aeaf2316f2a775ea4a359abe59

    SHA256

    288b26f98f4af04169e26b980357bbaf08412d645ed2403ae242f00a5c753ea7

    SHA512

    3bee37ad7f30a5cd48f686852b590c117ea6cd4e7e24db66c9f7ed9d30ca31f1896533c83eb4d3130cc6f213407e180aa38e58f53f4541d8f4f78a531e994b4d

  • C:\Windows\SysWOW64\Windupdt\winupdate.exe

    Filesize

    664KB

    MD5

    8854848a600589da4c3f738a8958ee62

    SHA1

    b47f082d3938fb97008518e8d1aedf12c34cac32

    SHA256

    6fda0fd3839b1877b2a675d09ec1438734131c881a5e2c00a18b487f18fae100

    SHA512

    9a1d0b4d395fd51081e47065e51e1555d7cbf08c2885b72d33594fa5f4ce2727bba0a5e66628d18733a3da9fae37d2dcf90eb8b8dd6fdc0d974adcb51886eb9e

  • memory/2524-39-0x0000000013140000-0x00000000131FA000-memory.dmp

    Filesize

    744KB

  • memory/2524-47-0x0000000013140000-0x00000000131FA000-memory.dmp

    Filesize

    744KB

  • memory/2524-49-0x0000000000440000-0x0000000000441000-memory.dmp

    Filesize

    4KB

  • memory/2524-48-0x0000000000190000-0x0000000000411000-memory.dmp

    Filesize

    2.5MB

  • memory/2524-46-0x0000000013140000-0x00000000131FA000-memory.dmp

    Filesize

    744KB

  • memory/2524-33-0x0000000013140000-0x00000000131FA000-memory.dmp

    Filesize

    744KB

  • memory/2524-38-0x0000000013140000-0x00000000131FA000-memory.dmp

    Filesize

    744KB

  • memory/2524-37-0x0000000013140000-0x00000000131FA000-memory.dmp

    Filesize

    744KB

  • memory/2524-35-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2664-31-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2664-5-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/2764-2-0x0000000013140000-0x00000000131FA000-memory.dmp

    Filesize

    744KB

  • memory/2764-4-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2764-43-0x0000000013140000-0x00000000131FA000-memory.dmp

    Filesize

    744KB