Analysis
-
max time kernel
132s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:20
Static task
static1
Behavioral task
behavioral1
Sample
68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
68d4998a4d43e5e8a17824ae9625d50e
-
SHA1
585e37a0cf5325b293a85d9e982d305e017387f3
-
SHA256
c952f7847e3506767527d442a29859b4bf6a85497e41695d20f563369055eccc
-
SHA512
33d61632b624c6f602e3dd88e403f55bb5b924f09a1e5014a9fa52138d82dde2f995dd4caf619f307ebf2b761f5342e28ea2bc33dbebd37b47745b05e09edec3
-
SSDEEP
24576:zAHnh+eWsN3skA4RV1Hom2KXMmHasyAkapHeoC0TLc3DbEJ5:+h+ZkldoPK8Yaseb2
Malware Config
Extracted
darkcomet
Amsterdam NL
ghostville.duckdns.org:1700
DCMIN_MUTEX-RWTUX06
-
gencode
ql2oH4DGvE30
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Drops startup file 1 IoCs
Processes:
68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CloudNotifications.url 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral2/memory/4744-2-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4744-6-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4744-7-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4744-8-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4744-11-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4744-10-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exedescription pid process target process PID 924 set thread context of 4744 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exedescription pid process Token: SeIncreaseQuotaPrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeSecurityPrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeLoadDriverPrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeSystemProfilePrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeSystemtimePrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeBackupPrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeRestorePrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeShutdownPrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeDebugPrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeUndockPrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeManageVolumePrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeImpersonatePrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: 33 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: 34 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: 35 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe Token: 36 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exepid process 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exepid process 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exepid process 4744 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exedescription pid process target process PID 924 wrote to memory of 2152 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe PID 924 wrote to memory of 2152 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe PID 924 wrote to memory of 2152 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe PID 924 wrote to memory of 4728 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe PID 924 wrote to memory of 4728 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe PID 924 wrote to memory of 4728 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe PID 924 wrote to memory of 1392 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe PID 924 wrote to memory of 1392 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe PID 924 wrote to memory of 1392 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe PID 924 wrote to memory of 4744 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe PID 924 wrote to memory of 4744 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe PID 924 wrote to memory of 4744 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe PID 924 wrote to memory of 4744 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe PID 924 wrote to memory of 4744 924 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe 68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe"2⤵PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe"2⤵PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe"2⤵PID:1392
-
-
C:\Users\Admin\AppData\Local\Temp\68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68d4998a4d43e5e8a17824ae9625d50e_JaffaCakes118.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4744
-