Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 18:43

General

  • Target

    JaffaCakes118_927a4dcb9526b2e79dc6d11e67eef066.exe

  • Size

    1.3MB

  • MD5

    927a4dcb9526b2e79dc6d11e67eef066

  • SHA1

    3803682042ee1d5521aae4dbf6d972c21fc75a7e

  • SHA256

    2daceb62312f99c4dd461400d8edf9d60df08a960744804c57db80f80a1af73a

  • SHA512

    18256255b8e2f1d6a0ee969a05ef7ab16f8ed58de156a8b93bdef9fd856e19d4052638ee890128af785936b1acf573f7eb389eac50c64267d61ceb5e7724c32d

  • SSDEEP

    24576:YUKoN0bUxgGa/pfBHDb+y1HgZ8lVlNMeeaPqmZC/CTLqI6i:LK1A6C7eXXw/CP4i

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

lastdede.zapto.org:81

Mutex

DC_MUTEX-F54S21D

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    v-.=-u.dMS00

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 60 IoCs
  • Suspicious use of FindShellTrayWindow 49 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_927a4dcb9526b2e79dc6d11e67eef066.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_927a4dcb9526b2e79dc6d11e67eef066.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\BEETHOVEN 9 NOLU SENFONISI (SCHERZO).WMA"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2808
    • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
      "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\BEETHOVEN 9 NOLU SENFONISI (SCHERZO).WMA"
        3⤵
          PID:2556
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          3⤵
            PID:2080
          • C:\Windows\explorer.exe
            "C:\Windows\explorer.exe"
            3⤵
              PID:1704
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Modifies registry class
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2388

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\BEETHOVEN 9 NOLU SENFONISI (SCHERZO).WMA

          Filesize

          604KB

          MD5

          7e40b30400b058ff9200cc41b853146d

          SHA1

          ba6697098d646e5d1f293496e3a98ad855040d09

          SHA256

          d83bbdaa27f44696dcc71f7345e683f4b2a1b3b996f0e1f063de80bac6a90076

          SHA512

          8379cdb1695c6fb2de5f58891fd1ee57fdf405b3f39f20f48134ed28440e0f3fdb363a79557a8c938b450896405d852f4de891613e7b1d61a724c00ae14c962f

        • \Users\Admin\Documents\MSDCSC\msdcsc.exe

          Filesize

          1.3MB

          MD5

          927a4dcb9526b2e79dc6d11e67eef066

          SHA1

          3803682042ee1d5521aae4dbf6d972c21fc75a7e

          SHA256

          2daceb62312f99c4dd461400d8edf9d60df08a960744804c57db80f80a1af73a

          SHA512

          18256255b8e2f1d6a0ee969a05ef7ab16f8ed58de156a8b93bdef9fd856e19d4052638ee890128af785936b1acf573f7eb389eac50c64267d61ceb5e7724c32d

        • memory/2556-26-0x000007FEFA160000-0x000007FEFA177000-memory.dmp

          Filesize

          92KB

        • memory/2556-25-0x000007FEFAEE0000-0x000007FEFAEF8000-memory.dmp

          Filesize

          96KB

        • memory/2556-16-0x000000013F7F0000-0x000000013F8E8000-memory.dmp

          Filesize

          992KB

        • memory/2556-17-0x000007FEF6FA0000-0x000007FEF6FD4000-memory.dmp

          Filesize

          208KB

        • memory/2556-18-0x000007FEF5790000-0x000007FEF5A46000-memory.dmp

          Filesize

          2.7MB

        • memory/2556-28-0x000007FEF6F80000-0x000007FEF6F91000-memory.dmp

          Filesize

          68KB

        • memory/2808-52-0x000007FEF5E80000-0x000007FEF5E91000-memory.dmp

          Filesize

          68KB

        • memory/2808-44-0x000007FEF44D0000-0x000007FEF5580000-memory.dmp

          Filesize

          16.7MB

        • memory/2808-33-0x000000013F7F0000-0x000000013F8E8000-memory.dmp

          Filesize

          992KB

        • memory/2808-34-0x000007FEF6FA0000-0x000007FEF6FD4000-memory.dmp

          Filesize

          208KB

        • memory/2808-35-0x000007FEF5790000-0x000007FEF5A46000-memory.dmp

          Filesize

          2.7MB

        • memory/2808-38-0x000007FEF6F80000-0x000007FEF6F91000-memory.dmp

          Filesize

          68KB

        • memory/2808-39-0x000007FEF69B0000-0x000007FEF69C7000-memory.dmp

          Filesize

          92KB

        • memory/2808-40-0x000007FEF6460000-0x000007FEF6471000-memory.dmp

          Filesize

          68KB

        • memory/2808-42-0x000007FEF6420000-0x000007FEF6431000-memory.dmp

          Filesize

          68KB

        • memory/2808-41-0x000007FEF6440000-0x000007FEF645D000-memory.dmp

          Filesize

          116KB

        • memory/2808-37-0x000007FEFA160000-0x000007FEFA177000-memory.dmp

          Filesize

          92KB

        • memory/2808-36-0x000007FEFAEE0000-0x000007FEFAEF8000-memory.dmp

          Filesize

          96KB

        • memory/2808-43-0x000007FEF5580000-0x000007FEF578B000-memory.dmp

          Filesize

          2.0MB

        • memory/2808-47-0x000007FEF5F60000-0x000007FEF5F78000-memory.dmp

          Filesize

          96KB

        • memory/2808-45-0x000007FEF5F80000-0x000007FEF5FC1000-memory.dmp

          Filesize

          260KB

        • memory/2808-55-0x000007FEF5DC0000-0x000007FEF5E27000-memory.dmp

          Filesize

          412KB

        • memory/2808-58-0x000007FEF4400000-0x000007FEF4424000-memory.dmp

          Filesize

          144KB

        • memory/2808-64-0x000007FEF41F0000-0x000007FEF4206000-memory.dmp

          Filesize

          88KB

        • memory/2808-46-0x000007FEF63F0000-0x000007FEF6411000-memory.dmp

          Filesize

          132KB

        • memory/2808-48-0x000007FEF5F00000-0x000007FEF5F11000-memory.dmp

          Filesize

          68KB

        • memory/2808-66-0x000007FEF25C0000-0x000007FEF25D1000-memory.dmp

          Filesize

          68KB

        • memory/2808-65-0x000007FEF4120000-0x000007FEF41E5000-memory.dmp

          Filesize

          788KB

        • memory/2808-63-0x000007FEF4210000-0x000007FEF4221000-memory.dmp

          Filesize

          68KB

        • memory/2808-62-0x000007FEF4230000-0x000007FEF425F000-memory.dmp

          Filesize

          188KB

        • memory/2808-61-0x000007FEFA150000-0x000007FEFA160000-memory.dmp

          Filesize

          64KB

        • memory/2808-60-0x000007FEF4260000-0x000007FEF4277000-memory.dmp

          Filesize

          92KB

        • memory/2808-59-0x000007FEF4280000-0x000007FEF4400000-memory.dmp

          Filesize

          1.5MB

        • memory/2808-57-0x000007FEF4430000-0x000007FEF4441000-memory.dmp

          Filesize

          68KB

        • memory/2808-56-0x000007FEF4450000-0x000007FEF44CC000-memory.dmp

          Filesize

          496KB

        • memory/2808-54-0x000007FEF5E30000-0x000007FEF5E60000-memory.dmp

          Filesize

          192KB

        • memory/2808-53-0x000007FEF5E60000-0x000007FEF5E78000-memory.dmp

          Filesize

          96KB

        • memory/2808-51-0x000007FEF5EA0000-0x000007FEF5EBB000-memory.dmp

          Filesize

          108KB

        • memory/2808-50-0x000007FEF5EC0000-0x000007FEF5ED1000-memory.dmp

          Filesize

          68KB

        • memory/2808-49-0x000007FEF5EE0000-0x000007FEF5EF1000-memory.dmp

          Filesize

          68KB

        • memory/2844-13-0x0000000000400000-0x000000000055E000-memory.dmp

          Filesize

          1.4MB

        • memory/2844-0-0x00000000002E0000-0x00000000002E1000-memory.dmp

          Filesize

          4KB

        • memory/2968-67-0x0000000000400000-0x000000000055E000-memory.dmp

          Filesize

          1.4MB