Analysis

  • max time kernel
    133s
  • max time network
    155s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250410-en
  • resource tags

    arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    18/04/2025, 01:25

General

  • Target

    JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe

  • Size

    764KB

  • MD5

    bbf7c96e37e67baf7969a1ef0002a403

  • SHA1

    5e1e6e63e3da11b4c4f0c8429e424d99fe354f8a

  • SHA256

    1f80d1af672a300c2704a261ba05c5cfb2dbbbb934749fdd26a7099a58259f77

  • SHA512

    268d13a2032df9290c7e18f9345ed7f885a8c80037a52b521e976ab76485c6cdc94e74c95495c317c69cffa2d761f532357822ff8089686912fec6ba8bf424e1

  • SSDEEP

    12288:XZeVQkTrvj4r6/nZXDm3ynq9OotqFP4G8erVnj1O61WltQOjuLkEsjfhNcMvC:XwQkTf4r69TiOoCeej1l1WltjrrIqC

Malware Config

Extracted

Family

darkcomet

Botnet

My server

C2

192.168.12.4:36049

Mutex

DC_MUTEX-8DYRWVQ

Attributes
  • InstallPath

    ransdWindupdt\windowz.exe

  • gencode

    B3a1qL*Pj1PT

  • install

    true

  • offline_keylogger

    true

  • password

    sopwenv1

  • persistence

    false

  • reg_key

    winupdater

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:6000
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Checks BIOS information in registry
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4864
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\SysWOW64\explorer.exe"
        3⤵
          PID:1160
        • C:\Windows\SysWOW64\ransdWindupdt\windowz.exe
          "C:\Windows\system32\ransdWindupdt\windowz.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1604
          • C:\Windows\SysWOW64\ransdWindupdt\windowz.exe
            "C:\Windows\SysWOW64\ransdWindupdt\windowz.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4648
            • C:\Windows\SysWOW64\explorer.exe
              "C:\Windows\SysWOW64\explorer.exe"
              5⤵
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4212
              • C:\Windows\SysWOW64\explorer.exe
                "C:\Windows\SysWOW64\explorer.exe"
                6⤵
                • Checks BIOS information in registry
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Enumerates system info in registry
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2460
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\ransdWindupdt\windowz.exe
      1⤵
        PID:2560
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\system32\ransdWindupdt\windowz.exe
        1⤵
          PID:1192

        Network

        MITRE ATT&CK Enterprise v16

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DDDDD.PNG

          Filesize

          95KB

          MD5

          fc7cb853ff46332d91e6a9d9695cc63e

          SHA1

          96752577b64c35e2b1ba0efa9b5e1da94aa73e76

          SHA256

          766c1a420bb0808d091d9586f88be36a4e4cc8321b7b3f37882d3f4f15a3cba3

          SHA512

          195702085117681f83833ebeb0d9fc7e81b1ac552e6d667209fe1063dbf0f269800311d8f333f0cc8a6949e27299f7339060def5ce0479aa9941e9613c5c1193

        • C:\Windows\SysWOW64\ransdWindupdt\windowz.exe

          Filesize

          764KB

          MD5

          bbf7c96e37e67baf7969a1ef0002a403

          SHA1

          5e1e6e63e3da11b4c4f0c8429e424d99fe354f8a

          SHA256

          1f80d1af672a300c2704a261ba05c5cfb2dbbbb934749fdd26a7099a58259f77

          SHA512

          268d13a2032df9290c7e18f9345ed7f885a8c80037a52b521e976ab76485c6cdc94e74c95495c317c69cffa2d761f532357822ff8089686912fec6ba8bf424e1

        • memory/1604-145-0x0000000000400000-0x00000000004C4000-memory.dmp

          Filesize

          784KB

        • memory/1604-96-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-94-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-97-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-98-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-99-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-100-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-102-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-103-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-104-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-105-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-106-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-93-0x0000000000400000-0x00000000004C4000-memory.dmp

          Filesize

          784KB

        • memory/1604-83-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-101-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-114-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-95-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-109-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-113-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-110-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-107-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-112-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-108-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/1604-111-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/4864-69-0x0000000000400000-0x00000000004E0000-memory.dmp

          Filesize

          896KB

        • memory/4864-65-0x0000000000400000-0x00000000004E0000-memory.dmp

          Filesize

          896KB

        • memory/4864-62-0x0000000000400000-0x00000000004E0000-memory.dmp

          Filesize

          896KB

        • memory/4864-59-0x0000000000400000-0x00000000004E0000-memory.dmp

          Filesize

          896KB

        • memory/4864-60-0x0000000000400000-0x00000000004E0000-memory.dmp

          Filesize

          896KB

        • memory/4864-92-0x0000000000400000-0x00000000004E0000-memory.dmp

          Filesize

          896KB

        • memory/6000-63-0x0000000074D30000-0x00000000752E1000-memory.dmp

          Filesize

          5.7MB

        • memory/6000-38-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-28-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-27-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-26-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-25-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-23-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-21-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-19-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-18-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-17-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-16-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-30-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-32-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-33-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-34-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-35-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-36-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-37-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-29-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-39-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-40-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-41-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-42-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-0-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-64-0x0000000074D30000-0x00000000752E1000-memory.dmp

          Filesize

          5.7MB

        • memory/6000-44-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-20-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-43-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-15-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-22-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-24-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-31-0x00000000006A0000-0x00000000006C0000-memory.dmp

          Filesize

          128KB

        • memory/6000-14-0x0000000074D30000-0x00000000752E1000-memory.dmp

          Filesize

          5.7MB

        • memory/6000-13-0x0000000074D30000-0x00000000752E1000-memory.dmp

          Filesize

          5.7MB

        • memory/6000-12-0x0000000074D31000-0x0000000074D32000-memory.dmp

          Filesize

          4KB

        • memory/6000-10-0x00000000008A0000-0x00000000008B0000-memory.dmp

          Filesize

          64KB

        • memory/6000-11-0x00000000008A0000-0x00000000008B0000-memory.dmp

          Filesize

          64KB

        • memory/6000-9-0x00000000008A0000-0x00000000008B0000-memory.dmp

          Filesize

          64KB

        • memory/6000-213-0x0000000074D30000-0x00000000752E1000-memory.dmp

          Filesize

          5.7MB