Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
07-04-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe
Resource
win7-20240319-en
General
-
Target
e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe
-
Size
944KB
-
MD5
e3c236d4baa95fe15655673cfe3de9bd
-
SHA1
64a5c72c26fd019835bbed524861d319f9b2add4
-
SHA256
b2e3badbec72d449e2208990a97399540f7ab826af5292107eff7a93cec85629
-
SHA512
4b0a0d2860161656a7bc89f8b33cd1f5da16b5ad28491a644b48888291a4ada37d926b1fe6f3afa6cb2594b7ffebba1aaa7a81d9e8207e8a32f1a7e63ff4470d
-
SSDEEP
24576:Fz/jdg3Dm5Z2E6rVU3JKD8Xnt5hV/lLXeaFeqSG:JLdg3aP6rVgNnt5hV/UxG
Malware Config
Extracted
darkcomet
Guest16
minecraftaccount.no-ip.info:1604
DC_MUTEX-4ASV9ZC
-
gencode
W36GpkH7SSu9
-
install
false
-
offline_keylogger
true
-
password
cutebro
-
persistence
false
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 3020 attrib.exe 2612 attrib.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exee3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exedescription pid process target process PID 2200 set thread context of 1376 2200 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 1376 set thread context of 2576 1376 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exepid process 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exee3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 1376 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeSecurityPrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeSystemtimePrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeBackupPrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeRestorePrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeShutdownPrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeDebugPrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeUndockPrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeManageVolumePrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeImpersonatePrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: 33 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: 34 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe Token: 35 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exee3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exee3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exejavaw.exepid process 2200 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe 1376 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe 1960 javaw.exe 1960 javaw.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exee3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exee3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.execmd.execmd.exedescription pid process target process PID 2200 wrote to memory of 1376 2200 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 2200 wrote to memory of 1376 2200 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 2200 wrote to memory of 1376 2200 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 2200 wrote to memory of 1376 2200 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 2200 wrote to memory of 1376 2200 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 2200 wrote to memory of 1376 2200 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 2200 wrote to memory of 1376 2200 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 2200 wrote to memory of 1376 2200 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 2200 wrote to memory of 1376 2200 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 1376 wrote to memory of 2576 1376 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 1376 wrote to memory of 2576 1376 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 1376 wrote to memory of 2576 1376 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 1376 wrote to memory of 2576 1376 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 1376 wrote to memory of 2576 1376 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 1376 wrote to memory of 2576 1376 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 1376 wrote to memory of 2576 1376 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 1376 wrote to memory of 2576 1376 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 1376 wrote to memory of 2576 1376 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 1376 wrote to memory of 2576 1376 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 1376 wrote to memory of 2576 1376 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 1376 wrote to memory of 2576 1376 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 1376 wrote to memory of 2576 1376 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe PID 2576 wrote to memory of 2400 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe cmd.exe PID 2576 wrote to memory of 2400 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe cmd.exe PID 2576 wrote to memory of 2400 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe cmd.exe PID 2576 wrote to memory of 2400 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe cmd.exe PID 2576 wrote to memory of 2416 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe cmd.exe PID 2576 wrote to memory of 2416 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe cmd.exe PID 2576 wrote to memory of 2416 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe cmd.exe PID 2576 wrote to memory of 2416 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe cmd.exe PID 2400 wrote to memory of 3020 2400 cmd.exe attrib.exe PID 2400 wrote to memory of 3020 2400 cmd.exe attrib.exe PID 2400 wrote to memory of 3020 2400 cmd.exe attrib.exe PID 2400 wrote to memory of 3020 2400 cmd.exe attrib.exe PID 2416 wrote to memory of 2612 2416 cmd.exe attrib.exe PID 2416 wrote to memory of 2612 2416 cmd.exe attrib.exe PID 2416 wrote to memory of 2612 2416 cmd.exe attrib.exe PID 2416 wrote to memory of 2612 2416 cmd.exe attrib.exe PID 2576 wrote to memory of 1960 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe javaw.exe PID 2576 wrote to memory of 1960 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe javaw.exe PID 2576 wrote to memory of 1960 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe javaw.exe PID 2576 wrote to memory of 1960 2576 e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe javaw.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 3020 attrib.exe 2612 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe"2⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe" +s +h4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\e3c236d4baa95fe15655673cfe3de9bd_JaffaCakes118.exe" +s +h5⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h5⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\WIRECLIENTLAUNCHER.JAR"4⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\WIRECLIENTLAUNCHER.JARFilesize
180KB
MD5a4b317832aaad1eda0e63fcc55ff115a
SHA161eae4a523d01918a15946862af7f9bf8686fe00
SHA256fa4564eb42437dd097108b741b620fa9071e70cb4ebc120aa6cb75669cf1d29a
SHA512ea973813bfde8697bb3a3c25cc9c728b76661fbba25bb8cbffd4e9abef6632ffce5a2dbd7465d2dad7243d19eb7b73a1029200dcfa934f249231e52bd0cedc22
-
memory/1376-15-0x0000000000400000-0x00000000004E4000-memory.dmpFilesize
912KB
-
memory/1376-5-0x0000000000400000-0x00000000004E4000-memory.dmpFilesize
912KB
-
memory/1376-7-0x0000000000400000-0x00000000004E4000-memory.dmpFilesize
912KB
-
memory/1376-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1376-13-0x0000000000400000-0x00000000004E4000-memory.dmpFilesize
912KB
-
memory/1376-47-0x0000000000400000-0x00000000004E4000-memory.dmpFilesize
912KB
-
memory/1376-3-0x0000000000400000-0x00000000004E4000-memory.dmpFilesize
912KB
-
memory/1960-76-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/1960-73-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/1960-71-0x0000000000180000-0x000000000018A000-memory.dmpFilesize
40KB
-
memory/1960-70-0x0000000000180000-0x000000000018A000-memory.dmpFilesize
40KB
-
memory/1960-64-0x00000000022E0000-0x00000000052E0000-memory.dmpFilesize
48.0MB
-
memory/1960-81-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/2200-2-0x0000000000400000-0x00000000004ED000-memory.dmpFilesize
948KB
-
memory/2576-39-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/2576-62-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/2576-42-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/2576-49-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/2576-50-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/2576-36-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/2576-57-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/2576-46-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/2576-32-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/2576-61-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/2576-66-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/2576-28-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/2576-25-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/2576-22-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/2576-20-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/2576-18-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB