Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 08:21

General

  • Target

    1a949339827c3534c314fc5cef076cfa_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    1a949339827c3534c314fc5cef076cfa

  • SHA1

    8d171e83dcba6d417e1729061a35a3a94dd8a648

  • SHA256

    fa6ca82b40ad7f1cad6350c10b9b1aca038ed678ba4705465f5eca4a9604a844

  • SHA512

    97b87eb9a7b787923e7284a83a461bd24c2dac08fdc968364f8c3dfa937967af5b2ee4c524dc47a162942d16010e5cd67439222ac875aa9301769936400bfb64

  • SSDEEP

    49152://CBhJF7gxl916Fy1xjK1egEVCa0cbKV:

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

192.168.178.27:1604

77.13.126.78:1604

Mutex

DC_MUTEX-H9FGMQM

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    S0syElonRqL0

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 8 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3448
      • C:\Users\Admin\AppData\Local\Temp\1a949339827c3534c314fc5cef076cfa_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\1a949339827c3534c314fc5cef076cfa_JaffaCakes118.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:1972
        • C:\Users\Admin\AppData\Local\Temp\SubSeven.exe
          "C:\Users\Admin\AppData\Local\Temp\SubSeven.exe"
          3⤵
          • Executes dropped EXE
          PID:2664
        • C:\Users\Admin\AppData\Local\Temp\PoisonIVY.exe
          "C:\Users\Admin\AppData\Local\Temp\PoisonIVY.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4612
          • C:\Users\Admin\AppData\Local\Temp\PoisonIVY.exe
            StubPath
            4⤵
            • Executes dropped EXE
            PID:552
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 464
              5⤵
              • Program crash
              PID:4696
        • C:\Users\Admin\AppData\Local\Temp\Bifrost.exe
          "C:\Users\Admin\AppData\Local\Temp\Bifrost.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1548
        • C:\Users\Admin\AppData\Local\Temp\DarkComet.exe
          "C:\Users\Admin\AppData\Local\Temp\DarkComet.exe"
          3⤵
          • Modifies WinLogon for persistence
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4380
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\DarkComet.exe" +s +h
            4⤵
              PID:1016
              • C:\Windows\SysWOW64\attrib.exe
                attrib "C:\Users\Admin\AppData\Local\Temp\DarkComet.exe" +s +h
                5⤵
                • Sets file to hidden
                • Views/modifies file attributes
                PID:2036
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
              4⤵
                PID:1608
                • C:\Windows\SysWOW64\attrib.exe
                  attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
                  5⤵
                  • Sets file to hidden
                  • Views/modifies file attributes
                  PID:3120
              • C:\Windows\SysWOW64\notepad.exe
                notepad
                4⤵
                • Loads dropped DLL
                PID:2292
              • C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
                "C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"
                4⤵
                • Modifies firewall policy service
                • Modifies security service
                • Windows security bypass
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Loads dropped DLL
                • Windows security modification
                • Adds Run key to start application
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:3440
                • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                  "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                  5⤵
                    PID:1948
                  • C:\Windows\explorer.exe
                    "C:\Windows\explorer.exe"
                    5⤵
                      PID:3592
                    • C:\Windows\SysWOW64\notepad.exe
                      notepad
                      5⤵
                      • Loads dropped DLL
                      PID:3848
                • C:\Users\Admin\AppData\Local\Temp\ProRat.exe
                  "C:\Users\Admin\AppData\Local\Temp\ProRat.exe"
                  3⤵
                  • Modifies WinLogon for persistence
                  • Adds policy Run key to start application
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Modifies WinLogon
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  • Suspicious use of WriteProcessMemory
                  PID:1592
                  • C:\Windows\SysWOW64\fservice.exe
                    C:\Windows\system32\fservice.exe
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • Drops file in Windows directory
                    • Suspicious use of WriteProcessMemory
                    PID:1700
                    • C:\Windows\services.exe
                      C:\Windows\services.exe -XP
                      5⤵
                      • Modifies WinLogon for persistence
                      • Adds policy Run key to start application
                      • Boot or Logon Autostart Execution: Active Setup
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Modifies WinLogon
                      • Drops file in System32 directory
                      • Drops file in Windows directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:1708
                      • C:\Windows\SysWOW64\NET.exe
                        NET STOP srservice
                        6⤵
                          PID:3392
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 STOP srservice
                            7⤵
                              PID:4572
                          • C:\Windows\SysWOW64\NET.exe
                            NET STOP navapsvc
                            6⤵
                              PID:2504
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 STOP navapsvc
                                7⤵
                                  PID:1172
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\ProRat.exe.bat
                            4⤵
                              PID:2120
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 552 -ip 552
                        1⤵
                          PID:648

                        Network

                        MITRE ATT&CK Matrix ATT&CK v13

                        Persistence

                        Boot or Logon Autostart Execution

                        5
                        T1547

                        Registry Run Keys / Startup Folder

                        2
                        T1547.001

                        Winlogon Helper DLL

                        2
                        T1547.004

                        Active Setup

                        1
                        T1547.014

                        Create or Modify System Process

                        2
                        T1543

                        Windows Service

                        2
                        T1543.003

                        Privilege Escalation

                        Boot or Logon Autostart Execution

                        5
                        T1547

                        Registry Run Keys / Startup Folder

                        2
                        T1547.001

                        Winlogon Helper DLL

                        2
                        T1547.004

                        Active Setup

                        1
                        T1547.014

                        Create or Modify System Process

                        2
                        T1543

                        Windows Service

                        2
                        T1543.003

                        Defense Evasion

                        Modify Registry

                        10
                        T1112

                        Impair Defenses

                        3
                        T1562

                        Disable or Modify Tools

                        2
                        T1562.001

                        Disable or Modify System Firewall

                        1
                        T1562.004

                        Hide Artifacts

                        2
                        T1564

                        Hidden Files and Directories

                        2
                        T1564.001

                        Discovery

                        Query Registry

                        1
                        T1012

                        System Information Discovery

                        2
                        T1082

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\Bifrost.exe
                          Filesize

                          48KB

                          MD5

                          00eb83e1bbfa6aec6d1e781a78bc0454

                          SHA1

                          a8ccad37a9f10f1d8020cdbc98029795e316d869

                          SHA256

                          a8e6e03de4677be7e8f8cf48b42abb3661f206ef26c5986df90813fca101d899

                          SHA512

                          20e07ad6c3aab6320311cf30a5b766ecbaafc49b2f76a63d497ec5c5e30da9df440ca37841f6e4242581aece640afd500e70e04649a110451ef4c3e27b689daf

                        • C:\Users\Admin\AppData\Local\Temp\DarkComet.exe
                          Filesize

                          660KB

                          MD5

                          84df488c078e35518db1fd6c9aa9ba87

                          SHA1

                          7119a12be57f669ed9d936294eaa703a89398f48

                          SHA256

                          58bee144b8930d90edac006468e5aefa0ecc44319d39cb3a6c9cf7cf13f68ca8

                          SHA512

                          e09c90223d4215a44818c9a21aa897e0372dbd63119bd602d38818240bc040c1d93cebd794bb96fed01ff9055ca3a2b2e08c15a23490fc6c263d778f06003a04

                        • C:\Users\Admin\AppData\Local\Temp\PoisonIVY.exe
                          Filesize

                          9KB

                          MD5

                          2621bf0c4086f801874857ca07eeae8e

                          SHA1

                          32ee702ce14d148f58f9344e22a4b8e301e562c5

                          SHA256

                          67f4623acc3ff4c84c4456e6f97a66d9ee2a148ce6a1aa1157b0aa362a379765

                          SHA512

                          33aa74e279f628711347b6910a343f8aa3a8ed31ef4c3d2e9226f43a8b237e9162e37605d67d89c359c6448e657bb10b9d8defbccf0322a728043708a49fd544

                        • C:\Users\Admin\AppData\Local\Temp\ProRat.exe
                          Filesize

                          342KB

                          MD5

                          5ac46ad5d65132a31357942360786b2f

                          SHA1

                          d8ba1b566f6bd314211feec4c1e2b3c3a2b9cb0a

                          SHA256

                          17c96882c2196c97937a7d594c6a43bad447263fe1efb5933c9575361ff98ecb

                          SHA512

                          c16957796155dcf64e467f413bfa6b3015a162e6454dfb6628523c0c6bb97deff5703d8616c0c8208123a95739ee9128c96ddf2a7e237a1e05e3a8f6036b5d35

                        • C:\Users\Admin\AppData\Local\Temp\ProRat.exe.bat
                          Filesize

                          129B

                          MD5

                          0781898738882613a4fc080c5fd2e0fa

                          SHA1

                          189dd18c413f16e9bb91a7fea1418b1e38cf14cf

                          SHA256

                          82e7b490e2cac6acded0eb708f6f70d14d7aba0153482f7939b3e1c93fb9ad42

                          SHA512

                          31ec42a845ea8065c96d9b3aef81c65d4c5476fd8ecedcfadc18503ad0d2daadc461e9b9f160c4855e1969a2b182dbc12b1ca3190d2f2ee8b47e92fb409d2f35

                        • C:\Users\Admin\AppData\Local\Temp\SubSeven.exe
                          Filesize

                          373KB

                          MD5

                          a1f91ceb13bd21061479d9716f63d42d

                          SHA1

                          e61ea5d2f230da5750235b1c7ea409393b8486e8

                          SHA256

                          cb834303994b8cbc637af4088e3329691581b635dbe78c4f2d4f3ed4cffd3b5e

                          SHA512

                          ad52194def19b51a4fd630fe50294b6d73aa0b523cf73f223d117c46af4d8e585eb703d335c826678a5ff87eea4b339469fec30f0f07f492837e98a69424d9b0

                        • C:\Windows\SysWOW64\reginv.dll
                          Filesize

                          36KB

                          MD5

                          562e0d01d6571fa2251a1e9f54c6cc69

                          SHA1

                          83677ad3bc630aa6327253c7b3deffbd4a8ce905

                          SHA256

                          c5b1d800c86d550c0b68c57c0d9911c1dd21df9e5e37e9e7bc032b5e66fdebe6

                          SHA512

                          166e132432eca24061f7e7d0c58c0b286e971ae2bc50f7c890b7707dd5dede19fcd83a5f79b6fd3f93dd691e07ad9bc1bd05fe82ccaade1610282188571585ea

                        • C:\Windows\SysWOW64\winkey.dll
                          Filesize

                          13KB

                          MD5

                          b4c72da9fd1a0dcb0698b7da97daa0cd

                          SHA1

                          b25a79e8ea4c723c58caab83aed6ea48de7ed759

                          SHA256

                          45d266269634ba2de70f179a26d7224111e677e66b38dff2802851b71ce4458f

                          SHA512

                          f5f184416c5381d275bc093c9275e9fdb35c58e2c401d188aef097950013de6e43269da5d4dd5e7baea34735bd7de664d15fe487b2292fd66926c9845b0cd066

                        • memory/1548-42-0x0000000010000000-0x0000000010011000-memory.dmp
                          Filesize

                          68KB

                        • memory/1548-41-0x0000000000400000-0x0000000000408000-memory.dmp
                          Filesize

                          32KB

                        • memory/1548-31-0x0000000010000000-0x0000000010011000-memory.dmp
                          Filesize

                          68KB

                        • memory/1592-118-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1592-55-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1700-113-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1700-71-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1708-99-0x0000000010000000-0x000000001000B000-memory.dmp
                          Filesize

                          44KB

                        • memory/1708-149-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1708-164-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1708-143-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1708-90-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1708-161-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1708-158-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1708-140-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1708-155-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1708-152-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1708-137-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1708-134-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1708-131-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1708-130-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1708-124-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1708-127-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1708-146-0x0000000000400000-0x00000000005FC000-memory.dmp
                          Filesize

                          2.0MB

                        • memory/1972-61-0x0000000075460000-0x0000000075A11000-memory.dmp
                          Filesize

                          5.7MB

                        • memory/1972-1-0x0000000075460000-0x0000000075A11000-memory.dmp
                          Filesize

                          5.7MB

                        • memory/1972-2-0x0000000075460000-0x0000000075A11000-memory.dmp
                          Filesize

                          5.7MB

                        • memory/1972-0-0x0000000075462000-0x0000000075463000-memory.dmp
                          Filesize

                          4KB

                        • memory/2292-72-0x0000000000F80000-0x0000000000F81000-memory.dmp
                          Filesize

                          4KB

                        • memory/2664-122-0x0000000000400000-0x000000000050C000-memory.dmp
                          Filesize

                          1.0MB

                        • memory/2664-14-0x0000000000400000-0x000000000050C000-memory.dmp
                          Filesize

                          1.0MB

                        • memory/3440-126-0x0000000000400000-0x00000000004B5000-memory.dmp
                          Filesize

                          724KB

                        • memory/3440-129-0x0000000000400000-0x00000000004B5000-memory.dmp
                          Filesize

                          724KB

                        • memory/3448-60-0x000000007FFC0000-0x000000007FFC6000-memory.dmp
                          Filesize

                          24KB

                        • memory/3448-34-0x000000007FFF0000-0x000000007FFF1000-memory.dmp
                          Filesize

                          4KB

                        • memory/3848-114-0x00000000006C0000-0x00000000006C1000-memory.dmp
                          Filesize

                          4KB

                        • memory/4380-100-0x0000000000400000-0x00000000004B5000-memory.dmp
                          Filesize

                          724KB

                        • memory/4612-40-0x0000000000400000-0x0000000000402600-memory.dmp
                          Filesize

                          9KB