Analysis

  • max time kernel
    89s
  • max time network
    149s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250410-en
  • resource tags

    arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/04/2025, 00:51

General

  • Target

    JaffaCakes118_c087ab223cc3224196e5b5a6fb37172a.exe

  • Size

    1.4MB

  • MD5

    c087ab223cc3224196e5b5a6fb37172a

  • SHA1

    399a0f9f34dec32237f9aeb2e466321c1b837809

  • SHA256

    1feaf5b5f3f475bf4cf68e25ae97113285dd26e425567be27f6ee0a8a4c78fa7

  • SHA512

    bd7c0867f20b61f3da9a95c82a3a1f78b9babf44427a117670bf72b74498a4f2765129a210db2b053954de6c41bf7a1e39c9fb0ce0b54ebc539fff98aaa736c5

  • SSDEEP

    24576:O2cFE1Bi8cIhuTtRLona+KWN3bvfI90GpLLLN:sEK8fKgnTG9LLN

Malware Config

Extracted

Family

darkcomet

Botnet

ChromeCrypter

C2

dargstar.no-ip.biz:1337

Mutex

DC_MUTEX-NJH7D26

Attributes
  • gencode

    d9iWp3$Ypntd

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Executes dropped EXE 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c087ab223cc3224196e5b5a6fb37172a.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c087ab223cc3224196e5b5a6fb37172a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5948
    • C:\Users\Admin\AppData\Local\Temp\vbc.exe
      C:\Users\Admin\AppData\Local\Temp\vbc.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5500
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\WinUpdtr\JaffaCakes118_c087ab223cc3224196e5b5a6fb37172a.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Users\Admin\AppData\Roaming\WinUpdtr\JaffaCakes118_c087ab223cc3224196e5b5a6fb37172a.exe
      C:\Users\Admin\AppData\Roaming\WinUpdtr\JaffaCakes118_c087ab223cc3224196e5b5a6fb37172a.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4148
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 908
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:5628

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\JaffaCakes118_c087ab223cc3224196e5b5a6fb37172a.exe.log

    Filesize

    116B

    MD5

    fbcc48ddf361df41da6b0400718841f8

    SHA1

    b6d3641dc3c8186662f3906a350e355f47e373e3

    SHA256

    ecb300191d0e3420d114338ed6850afa649b270f75c181ffe86b435420100870

    SHA512

    1d9d8e3335423152e7b19bc3b0ac8f04d318c342cfeb1567b9b82f0dde0e3d3f57c3fb7c312fbca7d9f46ba2383f32a2abc90df9a924f27da43f854bd490e578

  • C:\Users\Admin\AppData\Local\Temp\vbc.exe

    Filesize

    1.1MB

    MD5

    c67110872ae3b9a230031b6c353fd9d5

    SHA1

    93c13b8b2cd60d5ac1afade2d73691328d25166d

    SHA256

    d964bc9f883fa390acd51b8d8a6104c4fe4ba3e3630d4ff1a4a59ffd52b15f2e

    SHA512

    3e2960d91d0c97cbbea76a41fdb5eb6487a5c45779ad44a2a39c5e5c9415f3aeacf9c98462f1db555f0e315cf2fc6b426a0b18b3f639068985f44f208f8c5072

  • C:\Users\Admin\AppData\Roaming\WinUpdtr\JaffaCakes118_c087ab223cc3224196e5b5a6fb37172a.exe

    Filesize

    1.4MB

    MD5

    c087ab223cc3224196e5b5a6fb37172a

    SHA1

    399a0f9f34dec32237f9aeb2e466321c1b837809

    SHA256

    1feaf5b5f3f475bf4cf68e25ae97113285dd26e425567be27f6ee0a8a4c78fa7

    SHA512

    bd7c0867f20b61f3da9a95c82a3a1f78b9babf44427a117670bf72b74498a4f2765129a210db2b053954de6c41bf7a1e39c9fb0ce0b54ebc539fff98aaa736c5

  • memory/4148-24-0x0000000074511000-0x0000000074512000-memory.dmp

    Filesize

    4KB

  • memory/4148-33-0x0000000074510000-0x0000000074AC1000-memory.dmp

    Filesize

    5.7MB

  • memory/4148-26-0x0000000074510000-0x0000000074AC1000-memory.dmp

    Filesize

    5.7MB

  • memory/4148-25-0x0000000074510000-0x0000000074AC1000-memory.dmp

    Filesize

    5.7MB

  • memory/5500-18-0x00000000023A0000-0x00000000023A1000-memory.dmp

    Filesize

    4KB

  • memory/5500-35-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-17-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-16-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-12-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-47-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-15-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-14-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-10-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-7-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-46-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-45-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-34-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-44-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-36-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-37-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-38-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-39-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-40-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-41-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-42-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5500-43-0x0000000000400000-0x00000000004CB000-memory.dmp

    Filesize

    812KB

  • memory/5948-0-0x0000000074511000-0x0000000074512000-memory.dmp

    Filesize

    4KB

  • memory/5948-1-0x0000000074510000-0x0000000074AC1000-memory.dmp

    Filesize

    5.7MB

  • memory/5948-2-0x0000000074510000-0x0000000074AC1000-memory.dmp

    Filesize

    5.7MB

  • memory/5948-21-0x0000000074510000-0x0000000074AC1000-memory.dmp

    Filesize

    5.7MB