Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 13:25
Behavioral task
behavioral1
Sample
2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe
-
Size
4.8MB
-
MD5
2f5531d81967c8dd1679c1fccaccfa56
-
SHA1
e491c65f9df096be05c1be4573eb16618b20f729
-
SHA256
8bc0eae26528b785f20393a5cd5241846b4824de3ef3bfc1cef88b355f322ef0
-
SHA512
8b6140b0646fcd5a29c8b8d4c4503b35600bd8bd3327d14b158ca2bf826ff5af09919f1c8d02469422f0cf0cc412fadf0d01a26e0c8099128f22e55629cf9d2a
-
SSDEEP
49152:FQDgok308EE1Lc/LU0Y0d/y31HQXLvesSoAR6O8HRJiF:FQU/bK/LTY0B1WZoAR6NJ2
Malware Config
Extracted
darkcomet
Mal
cenkisgod.duckdns.org:1604
DC_MUTEX-KQ70CB5
-
InstallPath
svchost.exe
-
gencode
B3JeokQztkF1
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
System
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\B3JeokQztkF1\\svchost.exe" 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" svchost.exe -
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" svchost.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
CSGOINJECTOR.EXEsvchost.exepid process 3312 CSGOINJECTOR.EXE 1136 svchost.exe -
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\B3JeokQztkF1\\svchost.exe" 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\B3JeokQztkF1\\svchost.exe" svchost.exe -
Drops file in System32 directory 4 IoCs
Processes:
2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exedescription ioc process File created C:\Windows\SysWOW64\svchost.exe 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe File created C:\Windows\SysWOW64\B3JeokQztkF1\svchost.exe 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\B3JeokQztkF1\svchost.exe 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\B3JeokQztkF1\ 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exesvchost.exedescription pid process Token: SeIncreaseQuotaPrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeSecurityPrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeSystemtimePrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeBackupPrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeRestorePrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeShutdownPrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeDebugPrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeUndockPrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeManageVolumePrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeImpersonatePrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: 33 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: 34 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: 35 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: 36 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 1136 svchost.exe Token: SeSecurityPrivilege 1136 svchost.exe Token: SeTakeOwnershipPrivilege 1136 svchost.exe Token: SeLoadDriverPrivilege 1136 svchost.exe Token: SeSystemProfilePrivilege 1136 svchost.exe Token: SeSystemtimePrivilege 1136 svchost.exe Token: SeProfSingleProcessPrivilege 1136 svchost.exe Token: SeIncBasePriorityPrivilege 1136 svchost.exe Token: SeCreatePagefilePrivilege 1136 svchost.exe Token: SeBackupPrivilege 1136 svchost.exe Token: SeRestorePrivilege 1136 svchost.exe Token: SeShutdownPrivilege 1136 svchost.exe Token: SeDebugPrivilege 1136 svchost.exe Token: SeSystemEnvironmentPrivilege 1136 svchost.exe Token: SeChangeNotifyPrivilege 1136 svchost.exe Token: SeRemoteShutdownPrivilege 1136 svchost.exe Token: SeUndockPrivilege 1136 svchost.exe Token: SeManageVolumePrivilege 1136 svchost.exe Token: SeImpersonatePrivilege 1136 svchost.exe Token: SeCreateGlobalPrivilege 1136 svchost.exe Token: 33 1136 svchost.exe Token: 34 1136 svchost.exe Token: 35 1136 svchost.exe Token: 36 1136 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid process 1136 svchost.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exesvchost.exedescription pid process target process PID 2400 wrote to memory of 3312 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe CSGOINJECTOR.EXE PID 2400 wrote to memory of 3312 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe CSGOINJECTOR.EXE PID 2400 wrote to memory of 3312 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe CSGOINJECTOR.EXE PID 2400 wrote to memory of 1136 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe svchost.exe PID 2400 wrote to memory of 1136 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe svchost.exe PID 2400 wrote to memory of 1136 2400 2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe svchost.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe PID 1136 wrote to memory of 2644 1136 svchost.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f5531d81967c8dd1679c1fccaccfa56_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\CSGOINJECTOR.EXE"C:\Users\Admin\AppData\Local\Temp\CSGOINJECTOR.EXE"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\B3JeokQztkF1\svchost.exe"C:\Windows\system32\B3JeokQztkF1\svchost.exe"2⤵
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\CSGOINJECTOR.EXEFilesize
4.1MB
MD5ec06d885f4fc1cec0e225ed8a4d3bbee
SHA1070585ef1c8c397aa5a5e2bbe00571b5bd44ad61
SHA256fccbe29401728f2b52da85fbe9be48ddd6ba93deb48844c6bd66fa206defe67a
SHA51238106dba85019a39700b06973f327b61f1c12245643b072c4e485552e2e32462eacd4c0197f5062185b260df4ce6a79103891ffc894bf74ad2d319c4c377fac4
-
C:\Windows\SysWOW64\B3JeokQztkF1\svchost.exeFilesize
4.8MB
MD52f5531d81967c8dd1679c1fccaccfa56
SHA1e491c65f9df096be05c1be4573eb16618b20f729
SHA2568bc0eae26528b785f20393a5cd5241846b4824de3ef3bfc1cef88b355f322ef0
SHA5128b6140b0646fcd5a29c8b8d4c4503b35600bd8bd3327d14b158ca2bf826ff5af09919f1c8d02469422f0cf0cc412fadf0d01a26e0c8099128f22e55629cf9d2a
-
memory/1136-82-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/1136-78-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/1136-86-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/1136-85-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/1136-73-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/1136-74-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/1136-75-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/1136-76-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/1136-77-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/1136-70-0x0000000002790000-0x0000000002791000-memory.dmpFilesize
4KB
-
memory/1136-79-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/1136-80-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/1136-81-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/1136-84-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/1136-83-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/2400-0-0x0000000002690000-0x0000000002691000-memory.dmpFilesize
4KB
-
memory/2400-72-0x0000000000400000-0x00000000008D4000-memory.dmpFilesize
4.8MB
-
memory/2644-71-0x0000000001040000-0x0000000001041000-memory.dmpFilesize
4KB