Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 05:58
Behavioral task
behavioral1
Sample
1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe
-
Size
658KB
-
MD5
1b16b12d3173fc7d9e367af488934fb4
-
SHA1
fae4f74602773f66ae574e5adedb43fff66c28d6
-
SHA256
f596cc3ee3d53376fc24f363d50c51210e381c8d60f02ebc08f56681afd72ea6
-
SHA512
c5460ad9f848c5442aa5b36ef988c5c4d4d318cbe4dde3d34f4485060950a95f38233b5ceef7dffb62ba738ecd8c0a6ea51c99cfd699307d8b629717d0925c7f
-
SSDEEP
12288:a9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/h/:WZ1xuVVjfFoynPaVBUR8f+kN10EB5
Malware Config
Extracted
Family
darkcomet
Botnet
Guest16
C2
95.215.254.97:1604
Mutex
DC_MUTEX-5F4P2ZS
Attributes
-
gencode
CHwp4Gq604H6
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exedescription pid Process Token: SeIncreaseQuotaPrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeSecurityPrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeLoadDriverPrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeSystemProfilePrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeSystemtimePrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeBackupPrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeRestorePrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeShutdownPrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeDebugPrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeUndockPrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeManageVolumePrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeImpersonatePrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: 33 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: 34 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe Token: 35 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exepid Process 1904 1b16b12d3173fc7d9e367af488934fb4_JaffaCakes118.exe