Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 03:51
Behavioral task
behavioral1
Sample
0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe
-
Size
660KB
-
MD5
0290e54eb7e7f652fe81aedd265721d5
-
SHA1
5b910e05680f4305a0cfe542b12841c8ca6453cf
-
SHA256
582035e362c45975270e6868f215f00ee07866ae05e7a7b63fbaab44381bf423
-
SHA512
2c0d8dc7332f2b56b85f0f547224a2d9566d2493c6c35122a5cd8d227c0688142aec25f6c9edc013243b236ad1507ba04d5ab40edb08034f0b6e5adeb55efeae
-
SSDEEP
12288:4X2JVHMRtDaSm3TJvVNvWV5YTsY7tHwbz/htfcoCoK632zb7G/Q0n:uss2Sm39NNv9wY7tHwbzfIoK6Mof
Malware Config
Extracted
darkcomet
Retards
tehboss.no-ip.org:1604
DC_MUTEX-5BJCK2U
-
InstallPath
microsoft\svchost.exe
-
gencode
EpZ3tJtuYHzf
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
winlogon
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\microsoft\\svchost.exe" 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
notepad.exepid process 2888 notepad.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 2904 svchost.exe -
Loads dropped DLL 2 IoCs
Processes:
0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exepid process 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exesvchost.exeiexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\microsoft\\svchost.exe" 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\microsoft\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\microsoft\\svchost.exe" iexplore.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
svchost.exedescription pid process target process PID 2904 set thread context of 2500 2904 svchost.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exesvchost.exeiexplore.exedescription pid process Token: SeIncreaseQuotaPrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeSecurityPrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeSystemProfilePrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeSystemtimePrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeBackupPrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeRestorePrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeShutdownPrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeDebugPrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeUndockPrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeManageVolumePrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeImpersonatePrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: 33 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: 34 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: 35 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2904 svchost.exe Token: SeSecurityPrivilege 2904 svchost.exe Token: SeTakeOwnershipPrivilege 2904 svchost.exe Token: SeLoadDriverPrivilege 2904 svchost.exe Token: SeSystemProfilePrivilege 2904 svchost.exe Token: SeSystemtimePrivilege 2904 svchost.exe Token: SeProfSingleProcessPrivilege 2904 svchost.exe Token: SeIncBasePriorityPrivilege 2904 svchost.exe Token: SeCreatePagefilePrivilege 2904 svchost.exe Token: SeBackupPrivilege 2904 svchost.exe Token: SeRestorePrivilege 2904 svchost.exe Token: SeShutdownPrivilege 2904 svchost.exe Token: SeDebugPrivilege 2904 svchost.exe Token: SeSystemEnvironmentPrivilege 2904 svchost.exe Token: SeChangeNotifyPrivilege 2904 svchost.exe Token: SeRemoteShutdownPrivilege 2904 svchost.exe Token: SeUndockPrivilege 2904 svchost.exe Token: SeManageVolumePrivilege 2904 svchost.exe Token: SeImpersonatePrivilege 2904 svchost.exe Token: SeCreateGlobalPrivilege 2904 svchost.exe Token: 33 2904 svchost.exe Token: 34 2904 svchost.exe Token: 35 2904 svchost.exe Token: SeIncreaseQuotaPrivilege 2500 iexplore.exe Token: SeSecurityPrivilege 2500 iexplore.exe Token: SeTakeOwnershipPrivilege 2500 iexplore.exe Token: SeLoadDriverPrivilege 2500 iexplore.exe Token: SeSystemProfilePrivilege 2500 iexplore.exe Token: SeSystemtimePrivilege 2500 iexplore.exe Token: SeProfSingleProcessPrivilege 2500 iexplore.exe Token: SeIncBasePriorityPrivilege 2500 iexplore.exe Token: SeCreatePagefilePrivilege 2500 iexplore.exe Token: SeBackupPrivilege 2500 iexplore.exe Token: SeRestorePrivilege 2500 iexplore.exe Token: SeShutdownPrivilege 2500 iexplore.exe Token: SeDebugPrivilege 2500 iexplore.exe Token: SeSystemEnvironmentPrivilege 2500 iexplore.exe Token: SeChangeNotifyPrivilege 2500 iexplore.exe Token: SeRemoteShutdownPrivilege 2500 iexplore.exe Token: SeUndockPrivilege 2500 iexplore.exe Token: SeManageVolumePrivilege 2500 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
iexplore.exepid process 2500 iexplore.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exesvchost.exeiexplore.exedescription pid process target process PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2888 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 3016 wrote to memory of 2904 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe svchost.exe PID 3016 wrote to memory of 2904 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe svchost.exe PID 3016 wrote to memory of 2904 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe svchost.exe PID 3016 wrote to memory of 2904 3016 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe svchost.exe PID 2904 wrote to memory of 2500 2904 svchost.exe iexplore.exe PID 2904 wrote to memory of 2500 2904 svchost.exe iexplore.exe PID 2904 wrote to memory of 2500 2904 svchost.exe iexplore.exe PID 2904 wrote to memory of 2500 2904 svchost.exe iexplore.exe PID 2904 wrote to memory of 2500 2904 svchost.exe iexplore.exe PID 2904 wrote to memory of 2500 2904 svchost.exe iexplore.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe PID 2500 wrote to memory of 2640 2500 iexplore.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- Deletes itself
-
C:\Users\Admin\AppData\Roaming\microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\microsoft\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad4⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\Microsoft\svchost.exeFilesize
660KB
MD50290e54eb7e7f652fe81aedd265721d5
SHA15b910e05680f4305a0cfe542b12841c8ca6453cf
SHA256582035e362c45975270e6868f215f00ee07866ae05e7a7b63fbaab44381bf423
SHA5122c0d8dc7332f2b56b85f0f547224a2d9566d2493c6c35122a5cd8d227c0688142aec25f6c9edc013243b236ad1507ba04d5ab40edb08034f0b6e5adeb55efeae
-
memory/2500-33-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2640-74-0x0000000000320000-0x0000000000321000-memory.dmpFilesize
4KB
-
memory/2888-3-0x0000000000100000-0x0000000000101000-memory.dmpFilesize
4KB
-
memory/2888-22-0x0000000000030000-0x0000000000031000-memory.dmpFilesize
4KB
-
memory/2904-34-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/3016-0-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/3016-31-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB