Analysis

  • max time kernel
    102s
  • max time network
    107s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250411-en
  • resource tags

    arch:x64arch:x86image:win11-20250411-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    18/04/2025, 22:35

General

  • Target

    JaffaCakes118_c00d926b10ad42ff26efe51757c9c82b.exe

  • Size

    1.6MB

  • MD5

    c00d926b10ad42ff26efe51757c9c82b

  • SHA1

    0ad155a77754dc180690f6f53c166d50e7ebfe8f

  • SHA256

    6f6703cd07e74933c1218398be6766a6f1ff996ed19774104bb14653d86bffc8

  • SHA512

    e5cdce480e7b4b411959a7c44effa8c78f22be7ee433863c18e243a57907c0a68dd95960e8437f8c7aa9081b3430fd3a8453e58f4700c55a187ff34f3fd53388

  • SSDEEP

    49152:fRMIu+CNVXuj0qXPqXTSCNVXuj0qXPqXTC:SIudOjbPqjpOjbPqjC

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

mohamedmmk.zapto.org:81

Mutex

DC_MUTEX-CYTDPA6

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    FDueZ9vjN�o6

  • install

    false

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c00d926b10ad42ff26efe51757c9c82b.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c00d926b10ad42ff26efe51757c9c82b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5860
    • C:\Users\Admin\AppData\Local\Temp\1.exe
      C:\Users\Admin\AppData\Local\Temp/1.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\Users\Admin\AppData\Local\Temp\1.exe
        C:\Users\Admin\AppData\Local\Temp\1.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5720
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5388
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:764
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 424
              6⤵
              • Program crash
              PID:5028
    • C:\Users\Admin\AppData\Local\Temp\2.exe
      C:\Users\Admin\AppData\Local\Temp/2.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5724
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
    1⤵
      PID:4048
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 764 -ip 764
      1⤵
        PID:5004

      Network

      MITRE ATT&CK Enterprise v16

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\aut8D8A.tmp

        Filesize

        658KB

        MD5

        95c31953ea9b673b0b03ffbe4300506f

        SHA1

        54c7634c347caf36a85f64d9f0256cdb15b61449

        SHA256

        5329a0e4f917e95c68a451305a45b916f0db8df825f3fee5d735bc30c8317ba6

        SHA512

        0386dcd10cc26afd7c64bf304ffcf0760b587851c094baed9cab8da6a29a70a185161d9ad9d3cc1ac320341261a2fe34e6f282f5bb830e34796c1609568d1114

      • memory/5388-28-0x0000000000400000-0x00000000004A9000-memory.dmp

        Filesize

        676KB

      • memory/5720-23-0x0000000000400000-0x00000000004AF000-memory.dmp

        Filesize

        700KB

      • memory/5720-20-0x0000000000400000-0x00000000004AF000-memory.dmp

        Filesize

        700KB

      • memory/5720-24-0x0000000000400000-0x00000000004AF000-memory.dmp

        Filesize

        700KB

      • memory/5720-25-0x0000000000400000-0x00000000004AF000-memory.dmp

        Filesize

        700KB

      • memory/5720-26-0x0000000000400000-0x00000000004AF000-memory.dmp

        Filesize

        700KB

      • memory/5720-27-0x0000000000400000-0x00000000004AF000-memory.dmp

        Filesize

        700KB

      • memory/5720-29-0x0000000000400000-0x00000000004AF000-memory.dmp

        Filesize

        700KB

      • memory/5860-0-0x0000000000400000-0x00000000004C2000-memory.dmp

        Filesize

        776KB

      • memory/5860-21-0x0000000000400000-0x00000000004C2000-memory.dmp

        Filesize

        776KB