Analysis
-
max time kernel
140s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 01:07
Behavioral task
behavioral1
Sample
154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe
Resource
win7-20240215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe
-
Size
658KB
-
MD5
154bc64c24c549378859038c61fc86b7
-
SHA1
e78851ec0e0391aad331530b1dc7be1441b0ef0e
-
SHA256
7d7e5ce1c75ddcf2b7512f590621cc3bb9a023066af6e165df33edefea89ba2b
-
SHA512
ec919f3e87c1bca1d26631e7ddb68aa5d799c98752ac33b74193c14eaa5260ceda05dd6a859cdc2b2a4704ccee0e7dc131b22a36df23d2abaa8d816fbe72ffbb
-
SSDEEP
12288:29HMeUmcufrvA3kb445UEJ2jsWiD4EvFuu4cNgZhCiZKD/XdyFT:SiBIGkbxqEcjsWiDxguehC2Sk
Malware Config
Extracted
Family
darkcomet
Botnet
Guest16
C2
127.0.0.1:1604
Mutex
DC_MUTEX-FZGVX0E
Attributes
-
gencode
Dv8RdewDidox
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
154bc64c24c549378859038c61fc86b7_JaffaCakes118.exedescription pid process Token: SeIncreaseQuotaPrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeSecurityPrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeLoadDriverPrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeSystemProfilePrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeSystemtimePrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeBackupPrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeRestorePrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeShutdownPrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeDebugPrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeUndockPrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeManageVolumePrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeImpersonatePrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: 33 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: 34 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: 35 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe Token: 36 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
154bc64c24c549378859038c61fc86b7_JaffaCakes118.exepid process 4860 154bc64c24c549378859038c61fc86b7_JaffaCakes118.exe