Analysis

  • max time kernel
    148s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/03/2025, 02:38

General

  • Target

    JaffaCakes118_8854848a600589da4c3f738a8958ee62.exe

  • Size

    664KB

  • MD5

    8854848a600589da4c3f738a8958ee62

  • SHA1

    b47f082d3938fb97008518e8d1aedf12c34cac32

  • SHA256

    6fda0fd3839b1877b2a675d09ec1438734131c881a5e2c00a18b487f18fae100

  • SHA512

    9a1d0b4d395fd51081e47065e51e1555d7cbf08c2885b72d33594fa5f4ce2727bba0a5e66628d18733a3da9fae37d2dcf90eb8b8dd6fdc0d974adcb51886eb9e

  • SSDEEP

    12288:F9AFlAd0Z+89cxTGzO4AucTD8QP2lmFSrVs9LqRKyh:jAQ6Zx9cxTmOrucTIEFSpOGzh

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

127.0.0.1:1604

Mutex

DC_MUTEX-F54S21D

Attributes
  • InstallPath

    Windupdt\winupdate.exe

  • gencode

    s�=04$chbreo

  • install

    true

  • offline_keylogger

    false

  • persistence

    true

  • reg_key

    winupdater

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8854848a600589da4c3f738a8958ee62.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8854848a600589da4c3f738a8958ee62.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3244
    • C:\Windows\SysWOW64\notepad.exe
      notepad
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:1828
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Checks BIOS information in registry
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Demo.txt

    Filesize

    671B

    MD5

    fdda412125473a423d8717100c017467

    SHA1

    5f8fd28a02d3e2666c5722fcddcfa42d293f6f21

    SHA256

    61f72d568285ecf85fa3c76f573f81cc0dd171b1aaf90a1e8d055125fe94ea9b

    SHA512

    3e7a59b93e058d1457c21dc7e3af6528f7fadb52f689f278e750b5c4d2aa814caba55b17527c33d67e958f289561507ee0086699a2220dee72a2871f88846e44

  • C:\Users\Admin\AppData\Local\Temp\eula.1031.txt

    Filesize

    8B

    MD5

    9c2e0f7e7d68872e307cb8f9f08f2a42

    SHA1

    e675da7ea97a95aeaf2316f2a775ea4a359abe59

    SHA256

    288b26f98f4af04169e26b980357bbaf08412d645ed2403ae242f00a5c753ea7

    SHA512

    3bee37ad7f30a5cd48f686852b590c117ea6cd4e7e24db66c9f7ed9d30ca31f1896533c83eb4d3130cc6f213407e180aa38e58f53f4541d8f4f78a531e994b4d

  • C:\Windows\SysWOW64\Windupdt\winupdate.exe

    Filesize

    664KB

    MD5

    8854848a600589da4c3f738a8958ee62

    SHA1

    b47f082d3938fb97008518e8d1aedf12c34cac32

    SHA256

    6fda0fd3839b1877b2a675d09ec1438734131c881a5e2c00a18b487f18fae100

    SHA512

    9a1d0b4d395fd51081e47065e51e1555d7cbf08c2885b72d33594fa5f4ce2727bba0a5e66628d18733a3da9fae37d2dcf90eb8b8dd6fdc0d974adcb51886eb9e

  • memory/1828-5-0x0000000000C00000-0x0000000000C01000-memory.dmp

    Filesize

    4KB

  • memory/2640-14-0x0000000013140000-0x00000000131FA000-memory.dmp

    Filesize

    744KB

  • memory/2640-11-0x0000000013140000-0x00000000131FA000-memory.dmp

    Filesize

    744KB

  • memory/2640-10-0x0000000013140000-0x00000000131FA000-memory.dmp

    Filesize

    744KB

  • memory/2640-9-0x0000000013140000-0x00000000131FA000-memory.dmp

    Filesize

    744KB

  • memory/2640-18-0x0000000013140000-0x00000000131FA000-memory.dmp

    Filesize

    744KB

  • memory/2640-17-0x0000000013140000-0x00000000131FA000-memory.dmp

    Filesize

    744KB

  • memory/2640-19-0x0000000001760000-0x0000000001761000-memory.dmp

    Filesize

    4KB

  • memory/2640-20-0x0000000013140000-0x00000000131FA000-memory.dmp

    Filesize

    744KB

  • memory/3244-0-0x0000000013140000-0x00000000131FA000-memory.dmp

    Filesize

    744KB

  • memory/3244-3-0x0000000002370000-0x0000000002371000-memory.dmp

    Filesize

    4KB

  • memory/3244-16-0x0000000013140000-0x00000000131FA000-memory.dmp

    Filesize

    744KB