Analysis

  • max time kernel
    2s
  • max time network
    9s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 20:03

General

  • Target

    JaffaCakes118_96e1bddee639ba2a8e6516bb349d4aca.exe

  • Size

    714KB

  • MD5

    96e1bddee639ba2a8e6516bb349d4aca

  • SHA1

    e5b88cfb14e67fc78fb8f07a404be1806b956af0

  • SHA256

    281ebfa11ff288d6883a5000f0b497e5b952f6fbd20af7188ecd2fb7092a7106

  • SHA512

    a2ec8e6e8d716f76877ffe7e29206bec9e327396ae17450a8a5d92362b859c53ca63597bc378e35c74b380c6eb030bf6c7653dcdd04934a81b3e78f82a1dfc88

  • SSDEEP

    12288:ArN7nUD7w+y5TlRMk0SuDxH9DS/Q/17dGm9JhdMkH0XkV7cxoHqalOv:elUfM4vfSo/+43dMD1oHqa

Malware Config

Extracted

Family

darkcomet

Attributes
  • gencode

  • install

    false

  • offline_keylogger

    false

  • persistence

    false

rc4.plain

Extracted

Family

darkcomet

Botnet

N0$ Crypter

C2

dxoop590.no-ip.biz:81

Mutex

DC_MUTEX-4KV014K

Attributes
  • gencode

    LV�Wwt%%LPN=

  • install

    false

  • offline_keylogger

    true

  • password

    poidog

  • persistence

    false

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96e1bddee639ba2a8e6516bb349d4aca.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96e1bddee639ba2a8e6516bb349d4aca.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2904
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      2⤵
        PID:2800

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\System\msgrap.exe

      Filesize

      35KB

      MD5

      74e94e8eaa100a277d35b6c9d9b5198b

      SHA1

      849a335c5948699ac7568ee233365a398d87b805

      SHA256

      d46cfa88d0df863f1f6c55cbfe04af43cb48d603a0d976e0357a0aa9bdb67444

      SHA512

      c9850e0148d8c265c96fbdf267523133d96ec6a7c9eead51c0414b771712cb44d9dee0e01f94dfc0ae87b985943be7b7ba2f58fd4f18e3fedffedd5d3c917185

    • memory/2800-29-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2800-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2800-9-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2800-17-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2800-25-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2800-28-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2800-26-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2800-21-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2800-30-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2800-11-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2800-7-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2800-33-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2800-24-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2800-32-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2800-31-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2800-19-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2800-16-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2800-13-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/2904-2-0x0000000073F00000-0x00000000744AB000-memory.dmp

      Filesize

      5.7MB

    • memory/2904-0-0x0000000073F01000-0x0000000073F02000-memory.dmp

      Filesize

      4KB

    • memory/2904-1-0x0000000073F00000-0x00000000744AB000-memory.dmp

      Filesize

      5.7MB