Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 03:51
Behavioral task
behavioral1
Sample
0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe
-
Size
660KB
-
MD5
0290e54eb7e7f652fe81aedd265721d5
-
SHA1
5b910e05680f4305a0cfe542b12841c8ca6453cf
-
SHA256
582035e362c45975270e6868f215f00ee07866ae05e7a7b63fbaab44381bf423
-
SHA512
2c0d8dc7332f2b56b85f0f547224a2d9566d2493c6c35122a5cd8d227c0688142aec25f6c9edc013243b236ad1507ba04d5ab40edb08034f0b6e5adeb55efeae
-
SSDEEP
12288:4X2JVHMRtDaSm3TJvVNvWV5YTsY7tHwbz/htfcoCoK632zb7G/Q0n:uss2Sm39NNv9wY7tHwbzfIoK6Mof
Malware Config
Extracted
darkcomet
Retards
tehboss.no-ip.org:1604
DC_MUTEX-5BJCK2U
-
InstallPath
microsoft\svchost.exe
-
gencode
EpZ3tJtuYHzf
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
winlogon
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\microsoft\\svchost.exe" 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
notepad.exepid process 116 notepad.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 2024 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\microsoft\\svchost.exe" 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\microsoft\\svchost.exe" svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exesvchost.exedescription pid process Token: SeIncreaseQuotaPrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeSecurityPrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeSystemtimePrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeBackupPrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeRestorePrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeShutdownPrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeDebugPrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeUndockPrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeManageVolumePrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeImpersonatePrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: 33 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: 34 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: 35 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: 36 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2024 svchost.exe Token: SeSecurityPrivilege 2024 svchost.exe Token: SeTakeOwnershipPrivilege 2024 svchost.exe Token: SeLoadDriverPrivilege 2024 svchost.exe Token: SeSystemProfilePrivilege 2024 svchost.exe Token: SeSystemtimePrivilege 2024 svchost.exe Token: SeProfSingleProcessPrivilege 2024 svchost.exe Token: SeIncBasePriorityPrivilege 2024 svchost.exe Token: SeCreatePagefilePrivilege 2024 svchost.exe Token: SeBackupPrivilege 2024 svchost.exe Token: SeRestorePrivilege 2024 svchost.exe Token: SeShutdownPrivilege 2024 svchost.exe Token: SeDebugPrivilege 2024 svchost.exe Token: SeSystemEnvironmentPrivilege 2024 svchost.exe Token: SeChangeNotifyPrivilege 2024 svchost.exe Token: SeRemoteShutdownPrivilege 2024 svchost.exe Token: SeUndockPrivilege 2024 svchost.exe Token: SeManageVolumePrivilege 2024 svchost.exe Token: SeImpersonatePrivilege 2024 svchost.exe Token: SeCreateGlobalPrivilege 2024 svchost.exe Token: 33 2024 svchost.exe Token: 34 2024 svchost.exe Token: 35 2024 svchost.exe Token: 36 2024 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid process 2024 svchost.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exesvchost.exedescription pid process target process PID 2728 wrote to memory of 116 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 2728 wrote to memory of 116 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 2728 wrote to memory of 116 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 2728 wrote to memory of 116 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 2728 wrote to memory of 116 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 2728 wrote to memory of 116 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 2728 wrote to memory of 116 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 2728 wrote to memory of 116 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 2728 wrote to memory of 116 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 2728 wrote to memory of 116 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 2728 wrote to memory of 116 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 2728 wrote to memory of 116 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 2728 wrote to memory of 116 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 2728 wrote to memory of 116 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 2728 wrote to memory of 116 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 2728 wrote to memory of 116 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 2728 wrote to memory of 116 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe notepad.exe PID 2728 wrote to memory of 2024 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe svchost.exe PID 2728 wrote to memory of 2024 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe svchost.exe PID 2728 wrote to memory of 2024 2728 0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe svchost.exe PID 2024 wrote to memory of 2168 2024 svchost.exe iexplore.exe PID 2024 wrote to memory of 2168 2024 svchost.exe iexplore.exe PID 2024 wrote to memory of 2168 2024 svchost.exe iexplore.exe PID 2024 wrote to memory of 4288 2024 svchost.exe explorer.exe PID 2024 wrote to memory of 4288 2024 svchost.exe explorer.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe PID 2024 wrote to memory of 1468 2024 svchost.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0290e54eb7e7f652fe81aedd265721d5_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- Deletes itself
-
C:\Users\Admin\AppData\Roaming\microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\microsoft\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exeFilesize
660KB
MD50290e54eb7e7f652fe81aedd265721d5
SHA15b910e05680f4305a0cfe542b12841c8ca6453cf
SHA256582035e362c45975270e6868f215f00ee07866ae05e7a7b63fbaab44381bf423
SHA5122c0d8dc7332f2b56b85f0f547224a2d9566d2493c6c35122a5cd8d227c0688142aec25f6c9edc013243b236ad1507ba04d5ab40edb08034f0b6e5adeb55efeae
-
memory/116-3-0x0000000000580000-0x0000000000581000-memory.dmpFilesize
4KB
-
memory/1468-65-0x0000000000F80000-0x0000000000F81000-memory.dmpFilesize
4KB
-
memory/2024-70-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2024-72-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2024-79-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2024-66-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2024-67-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2024-68-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2024-69-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2024-78-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2024-71-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2024-64-0x0000000002370000-0x0000000002371000-memory.dmpFilesize
4KB
-
memory/2024-73-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2024-74-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2024-75-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2024-76-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2024-77-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/2728-0-0x0000000002250000-0x0000000002251000-memory.dmpFilesize
4KB
-
memory/2728-62-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB