Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 13:25
Behavioral task
behavioral1
Sample
2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe
-
Size
4.8MB
-
MD5
2f5531d81967c8dd1679c1fccaccfa56
-
SHA1
e491c65f9df096be05c1be4573eb16618b20f729
-
SHA256
8bc0eae26528b785f20393a5cd5241846b4824de3ef3bfc1cef88b355f322ef0
-
SHA512
8b6140b0646fcd5a29c8b8d4c4503b35600bd8bd3327d14b158ca2bf826ff5af09919f1c8d02469422f0cf0cc412fadf0d01a26e0c8099128f22e55629cf9d2a
-
SSDEEP
49152:FQDgok308EE1Lc/LU0Y0d/y31HQXLvesSoAR6O8HRJiF:FQU/bK/LTY0B1WZoAR6NJ2
Malware Config
Extracted
darkcomet
Mal
cenkisgod.duckdns.org:1604
DC_MUTEX-KQ70CB5
-
InstallPath
svchost.exe
-
gencode
B3JeokQztkF1
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
System
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\B3JeokQztkF1\\svchost.exe" 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" svchost.exe -
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" svchost.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" svchost.exe -
Executes dropped EXE 2 IoCs
Processes:
CSGOINJECTOR.EXEsvchost.exepid process 3056 CSGOINJECTOR.EXE 2596 svchost.exe -
Loads dropped DLL 3 IoCs
Processes:
2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exepid process 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe -
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\B3JeokQztkF1\\svchost.exe" 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\B3JeokQztkF1\\svchost.exe" svchost.exe -
Drops file in System32 directory 4 IoCs
Processes:
2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exedescription ioc process File created C:\Windows\SysWOW64\svchost.exe 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe File created C:\Windows\SysWOW64\B3JeokQztkF1\svchost.exe 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\B3JeokQztkF1\svchost.exe 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\B3JeokQztkF1\ 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exesvchost.exedescription pid process Token: SeIncreaseQuotaPrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeSecurityPrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeSystemtimePrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeBackupPrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeRestorePrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeShutdownPrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeDebugPrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeUndockPrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeManageVolumePrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeImpersonatePrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: 33 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: 34 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: 35 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2596 svchost.exe Token: SeSecurityPrivilege 2596 svchost.exe Token: SeTakeOwnershipPrivilege 2596 svchost.exe Token: SeLoadDriverPrivilege 2596 svchost.exe Token: SeSystemProfilePrivilege 2596 svchost.exe Token: SeSystemtimePrivilege 2596 svchost.exe Token: SeProfSingleProcessPrivilege 2596 svchost.exe Token: SeIncBasePriorityPrivilege 2596 svchost.exe Token: SeCreatePagefilePrivilege 2596 svchost.exe Token: SeBackupPrivilege 2596 svchost.exe Token: SeRestorePrivilege 2596 svchost.exe Token: SeShutdownPrivilege 2596 svchost.exe Token: SeDebugPrivilege 2596 svchost.exe Token: SeSystemEnvironmentPrivilege 2596 svchost.exe Token: SeChangeNotifyPrivilege 2596 svchost.exe Token: SeRemoteShutdownPrivilege 2596 svchost.exe Token: SeUndockPrivilege 2596 svchost.exe Token: SeManageVolumePrivilege 2596 svchost.exe Token: SeImpersonatePrivilege 2596 svchost.exe Token: SeCreateGlobalPrivilege 2596 svchost.exe Token: 33 2596 svchost.exe Token: 34 2596 svchost.exe Token: 35 2596 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid process 2596 svchost.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exesvchost.exedescription pid process target process PID 2148 wrote to memory of 3056 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe CSGOINJECTOR.EXE PID 2148 wrote to memory of 3056 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe CSGOINJECTOR.EXE PID 2148 wrote to memory of 3056 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe CSGOINJECTOR.EXE PID 2148 wrote to memory of 3056 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe CSGOINJECTOR.EXE PID 2148 wrote to memory of 2596 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe svchost.exe PID 2148 wrote to memory of 2596 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe svchost.exe PID 2148 wrote to memory of 2596 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe svchost.exe PID 2148 wrote to memory of 2596 2148 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe svchost.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe PID 2596 wrote to memory of 2672 2596 svchost.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\CSGOINJECTOR.EXE"C:\Users\Admin\AppData\Local\Temp\CSGOINJECTOR.EXE"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\B3JeokQztkF1\svchost.exe"C:\Windows\system32\B3JeokQztkF1\svchost.exe"2⤵
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\CSGOINJECTOR.EXEFilesize
4.1MB
MD5ec06d885f4fc1cec0e225ed8a4d3bbee
SHA1070585ef1c8c397aa5a5e2bbe00571b5bd44ad61
SHA256fccbe29401728f2b52da85fbe9be48ddd6ba93deb48844c6bd66fa206defe67a
SHA51238106dba85019a39700b06973f327b61f1c12245643b072c4e485552e2e32462eacd4c0197f5062185b260df4ce6a79103891ffc894bf74ad2d319c4c377fac4
-
\Windows\SysWOW64\B3JeokQztkF1\svchost.exeFilesize
4.8MB
MD52f5531d81967c8dd1679c1fccaccfa56
SHA1e491c65f9df096be05c1be4573eb16618b20f729
SHA2568bc0eae26528b785f20393a5cd5241846b4824de3ef3bfc1cef88b355f322ef0
SHA5128b6140b0646fcd5a29c8b8d4c4503b35600bd8bd3327d14b158ca2bf826ff5af09919f1c8d02469422f0cf0cc412fadf0d01a26e0c8099128f22e55629cf9d2a
-
memory/2148-58-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/2148-0-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/2596-63-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/2596-64-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/2596-59-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/2596-60-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/2596-61-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/2596-62-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/2596-72-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/2596-71-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/2596-65-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/2596-66-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/2596-67-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/2596-68-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/2596-69-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/2596-70-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/2672-57-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/2672-19-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB