Analysis

  • max time kernel
    141s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/03/2025, 19:30

General

  • Target

    JaffaCakes118_94e20e1f4b2265385e9a505a548937c1.exe

  • Size

    658KB

  • MD5

    94e20e1f4b2265385e9a505a548937c1

  • SHA1

    182268647e23051d61d0cd0fe1c85d61d3bef38d

  • SHA256

    30cbd237dd340322b6e73a4fcc1db9446b9a7fc902e5d59afd00281f5bcf9ae6

  • SHA512

    29acd885e925a1ba7bc85fc56d1fa5d1fa7b748892d287297abd000fad40b9dcf79197221bf2480d1ce04b6b7e58bdcc768ffed730d4672dce0f16dc9a4b5697

  • SSDEEP

    12288:S9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLO9EkfC/Bw:+Z1xuVVjfFoynPaVBUR8f+kN1SEHS

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_94e20e1f4b2265385e9a505a548937c1.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_94e20e1f4b2265385e9a505a548937c1.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3256
    • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
      "C:\Windows\system32\MSDCSC\msdcsc.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4432
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe
    1⤵
      PID:4800
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe
      1⤵
        PID:4516
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe
        1⤵
          PID:1908
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe
          1⤵
            PID:3304
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe
            1⤵
              PID:1800
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe
              1⤵
                PID:4084
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe
                1⤵
                  PID:2652
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe
                  1⤵
                    PID:3940
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe
                    1⤵
                      PID:740
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe
                      1⤵
                        PID:2120
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe
                        1⤵
                          PID:1364
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe
                          1⤵
                            PID:368
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe
                            1⤵
                              PID:972
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe
                              1⤵
                                PID:2376
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe
                                1⤵
                                  PID:3832
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c C:\Windows\system32\MSDCSC\msdcsc.exe
                                  1⤵
                                    PID:4472

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe

                                    Filesize

                                    658KB

                                    MD5

                                    94e20e1f4b2265385e9a505a548937c1

                                    SHA1

                                    182268647e23051d61d0cd0fe1c85d61d3bef38d

                                    SHA256

                                    30cbd237dd340322b6e73a4fcc1db9446b9a7fc902e5d59afd00281f5bcf9ae6

                                    SHA512

                                    29acd885e925a1ba7bc85fc56d1fa5d1fa7b748892d287297abd000fad40b9dcf79197221bf2480d1ce04b6b7e58bdcc768ffed730d4672dce0f16dc9a4b5697

                                  • memory/3256-0-0x0000000000650000-0x0000000000651000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3256-62-0x0000000000400000-0x00000000004B2000-memory.dmp

                                    Filesize

                                    712KB

                                  • memory/4432-61-0x0000000002070000-0x0000000002071000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4432-64-0x0000000002070000-0x0000000002071000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4432-63-0x0000000000400000-0x00000000004B2000-memory.dmp

                                    Filesize

                                    712KB

                                  • memory/4432-66-0x0000000000400000-0x00000000004B2000-memory.dmp

                                    Filesize

                                    712KB