Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2024 00:19

General

  • Target

    1816dd0f974fecd01a3aee390593de19_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    1816dd0f974fecd01a3aee390593de19

  • SHA1

    67c477675af6dfd5fca81669a58daae9fa8ddc8c

  • SHA256

    4b259a4d6a566836a4e511b7ca5d0bd5775360fd52eaf89b03035d4e602431c5

  • SHA512

    2488732d171cbd43f283cf423d493b1294439a5a4e200b6454a24267eb8f2a815058ef4798c16198b9b6bd4dbbb5442adaf103f483b02935b098bd9fa5fe966a

  • SSDEEP

    24576:KdWfwUBOzQKW8d4UR/tqhnyMIo0eyauZUKctbFPZX46fJ6dVUqhkNvaWJ6Uq:q0p6pR/mndIoxyPU/btmVUqyRTq

Malware Config

Extracted

Family

darkcomet

Botnet

metin2-gio

C2

127.0.0.1:1604

hepter.dyndns.biz:8211

hepter.no-ip.org:8211

127.0.0.1:8211

Mutex

DC_MUTEX-C50UDX6

Attributes
  • InstallPath

    Resimlerim\Profiles\chrome.exe

  • gencode

    ja8PAQUAvm4V

  • install

    true

  • offline_keylogger

    true

  • password

    hepter

  • persistence

    true

  • reg_key

    GoogleUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1816dd0f974fecd01a3aee390593de19_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1816dd0f974fecd01a3aee390593de19_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\AppData\Local\Temp\1816dd0f974fecd01a3aee390593de19_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\1816dd0f974fecd01a3aee390593de19_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1568
      • C:\Users\Admin\AppData\Local\Temp\1816dd0f974fecd01a3aee390593de19_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\1816dd0f974fecd01a3aee390593de19_JaffaCakes118.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Checks computer location settings
        • Adds Run key to start application
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:684
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\1816dd0f974fecd01a3aee390593de19_JaffaCakes118.exe" +s +h
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4088
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Users\Admin\AppData\Local\Temp\1816dd0f974fecd01a3aee390593de19_JaffaCakes118.exe" +s +h
            5⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:884
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4084
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
            5⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:756
        • C:\Windows\SysWOW64\notepad.exe
          notepad
          4⤵
          • Deletes itself
          PID:5100
        • C:\Users\Admin\Documents\Resimlerim\Profiles\chrome.exe
          "C:\Users\Admin\Documents\Resimlerim\Profiles\chrome.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2576
          • C:\Users\Admin\Documents\Resimlerim\Profiles\chrome.exe
            "C:\Users\Admin\Documents\Resimlerim\Profiles\chrome.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4228
            • C:\Users\Admin\Documents\Resimlerim\Profiles\chrome.exe
              "C:\Users\Admin\Documents\Resimlerim\Profiles\chrome.exe"
              6⤵
              • Modifies firewall policy service
              • Modifies security service
              • Windows security bypass
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Windows security modification
              • Adds Run key to start application
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:2796
              • C:\Windows\SysWOW64\notepad.exe
                notepad
                7⤵
                  PID:5044
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1344 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:872

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      2
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Winlogon Helper DLL

      1
      T1547.004

      Create or Modify System Process

      2
      T1543

      Windows Service

      2
      T1543.003

      Privilege Escalation

      Boot or Logon Autostart Execution

      2
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Winlogon Helper DLL

      1
      T1547.004

      Create or Modify System Process

      2
      T1543

      Windows Service

      2
      T1543.003

      Defense Evasion

      Modify Registry

      6
      T1112

      Impair Defenses

      3
      T1562

      Disable or Modify Tools

      2
      T1562.001

      Disable or Modify System Firewall

      1
      T1562.004

      Hide Artifacts

      2
      T1564

      Hidden Files and Directories

      2
      T1564.001

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3808065738-1666277613-1125846146-1000\88603cb2913a7df3fbd16b5f958e6447_2397ee06-28fe-4eaa-8777-f7014368c353
        Filesize

        51B

        MD5

        5fc2ac2a310f49c14d195230b91a8885

        SHA1

        90855cc11136ba31758fe33b5cf9571f9a104879

        SHA256

        374e0e2897a7a82e0e44794cad89df0f3cdd7703886239c1fe06d625efd48092

        SHA512

        ab46554df9174b9fe9beba50a640f67534c3812f64d96a1fb8adfdc136dfe730ca2370825cd45b7f87a544d6a58dd868cb5a3a7f42e2789f6d679dbc0fdd52c3

      • C:\Users\Admin\Documents\Resimlerim\Profiles\chrome.exe
        Filesize

        1.3MB

        MD5

        1816dd0f974fecd01a3aee390593de19

        SHA1

        67c477675af6dfd5fca81669a58daae9fa8ddc8c

        SHA256

        4b259a4d6a566836a4e511b7ca5d0bd5775360fd52eaf89b03035d4e602431c5

        SHA512

        2488732d171cbd43f283cf423d493b1294439a5a4e200b6454a24267eb8f2a815058ef4798c16198b9b6bd4dbbb5442adaf103f483b02935b098bd9fa5fe966a

      • C:\Windows\SysWOW64\0c0c0c0c.dll
        Filesize

        1.3MB

        MD5

        df5c622697dc8c743f3884914a9e4d99

        SHA1

        cdfc6345080dfa9c45d323f15532ad9274385d2f

        SHA256

        0ca52bc5cf854e274e15ba07df97b2e75ec4e1fc2d90f23676da7fa3c95da089

        SHA512

        59867bb9608c250661a6eb823f06c907d334eb4f638b04f21cf10213e5163035c37261f5213642c703dd382871a5d3ae764839c1b93e18e833d85ac0e3409f90

      • memory/684-91-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/684-16-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/684-17-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/684-20-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/684-21-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/684-22-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/1568-8-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/1568-11-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/1568-18-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/1600-10-0x0000000000400000-0x00000000005D4000-memory.dmp
        Filesize

        1.8MB

      • memory/1600-0-0x0000000000400000-0x00000000005D4000-memory.dmp
        Filesize

        1.8MB

      • memory/1600-1-0x00000000001C0000-0x00000000001C3000-memory.dmp
        Filesize

        12KB

      • memory/2576-99-0x0000000000400000-0x00000000005D4000-memory.dmp
        Filesize

        1.8MB

      • memory/2796-103-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/2796-113-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/2796-123-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/2796-107-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/2796-106-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/2796-109-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/2796-110-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/2796-122-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/2796-121-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/2796-111-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/2796-112-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/2796-120-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/2796-114-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/2796-115-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/2796-116-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/2796-117-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/2796-118-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/2796-119-0x0000000000400000-0x00000000004BC000-memory.dmp
        Filesize

        752KB

      • memory/4228-95-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/4228-104-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/5044-108-0x0000000001330000-0x0000000001331000-memory.dmp
        Filesize

        4KB

      • memory/5100-26-0x0000000001360000-0x0000000001361000-memory.dmp
        Filesize

        4KB