Analysis

  • max time kernel
    133s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2025, 01:25

General

  • Target

    JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe

  • Size

    764KB

  • MD5

    bbf7c96e37e67baf7969a1ef0002a403

  • SHA1

    5e1e6e63e3da11b4c4f0c8429e424d99fe354f8a

  • SHA256

    1f80d1af672a300c2704a261ba05c5cfb2dbbbb934749fdd26a7099a58259f77

  • SHA512

    268d13a2032df9290c7e18f9345ed7f885a8c80037a52b521e976ab76485c6cdc94e74c95495c317c69cffa2d761f532357822ff8089686912fec6ba8bf424e1

  • SSDEEP

    12288:XZeVQkTrvj4r6/nZXDm3ynq9OotqFP4G8erVnj1O61WltQOjuLkEsjfhNcMvC:XwQkTf4r69TiOoCeej1l1WltjrrIqC

Malware Config

Extracted

Family

darkcomet

Botnet

My server

C2

192.168.12.4:36049

Mutex

DC_MUTEX-8DYRWVQ

Attributes
  • InstallPath

    ransdWindupdt\windowz.exe

  • gencode

    B3a1qL*Pj1PT

  • install

    true

  • offline_keylogger

    true

  • password

    sopwenv1

  • persistence

    false

  • reg_key

    winupdater

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4424
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Checks BIOS information in registry
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3656
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\SysWOW64\explorer.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4844
        • C:\Windows\SysWOW64\explorer.exe
          "C:\Windows\SysWOW64\explorer.exe"
          4⤵
          • Checks BIOS information in registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:4996
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Windows\system32\ransdWindupdt\windowz.exe
    1⤵
      PID:4888

    Network

    MITRE ATT&CK Enterprise v16

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\DDDDD.PNG

      Filesize

      95KB

      MD5

      fc7cb853ff46332d91e6a9d9695cc63e

      SHA1

      96752577b64c35e2b1ba0efa9b5e1da94aa73e76

      SHA256

      766c1a420bb0808d091d9586f88be36a4e4cc8321b7b3f37882d3f4f15a3cba3

      SHA512

      195702085117681f83833ebeb0d9fc7e81b1ac552e6d667209fe1063dbf0f269800311d8f333f0cc8a6949e27299f7339060def5ce0479aa9941e9613c5c1193

    • memory/3656-69-0x0000000000400000-0x00000000004E0000-memory.dmp

      Filesize

      896KB

    • memory/3656-82-0x0000000000400000-0x00000000004E0000-memory.dmp

      Filesize

      896KB

    • memory/3656-99-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/3656-74-0x0000000000400000-0x00000000004E0000-memory.dmp

      Filesize

      896KB

    • memory/3656-75-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/3656-73-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/3656-71-0x0000000000400000-0x00000000004E0000-memory.dmp

      Filesize

      896KB

    • memory/3656-68-0x0000000000400000-0x00000000004E0000-memory.dmp

      Filesize

      896KB

    • memory/4424-22-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-14-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4424-47-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-49-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4424-64-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4424-61-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4424-60-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4424-59-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4424-67-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4424-17-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4424-16-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4424-13-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4424-46-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-44-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-43-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-42-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-41-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-40-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-39-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-38-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-37-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-36-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-35-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-34-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-33-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-32-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-31-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-30-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-29-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-28-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-27-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-26-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-25-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-24-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-23-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-0-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-21-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-20-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-19-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-18-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-45-0x00000000001C0000-0x00000000001E0000-memory.dmp

      Filesize

      128KB

    • memory/4424-15-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4424-72-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4424-12-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4424-9-0x0000000077910000-0x0000000077911000-memory.dmp

      Filesize

      4KB

    • memory/4424-11-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4424-10-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4844-116-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-115-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-97-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4844-95-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4844-94-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4844-93-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4844-118-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-144-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4844-147-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4844-150-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4844-114-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-158-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4844-143-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4844-142-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4844-132-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4844-96-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4844-100-0x00000000778F0000-0x00000000779E0000-memory.dmp

      Filesize

      960KB

    • memory/4844-117-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-83-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-113-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-112-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-111-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-110-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-109-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-108-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-107-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-106-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-105-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-104-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-103-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-102-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-101-0x0000000000DA0000-0x0000000000DC0000-memory.dmp

      Filesize

      128KB

    • memory/4844-79-0x0000000000400000-0x00000000004C4000-memory.dmp

      Filesize

      784KB

    • memory/4844-81-0x0000000000400000-0x00000000004C4000-memory.dmp

      Filesize

      784KB