Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 05:03
Static task
static1
Behavioral task
behavioral1
Sample
0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe
-
Size
948KB
-
MD5
0308c1516fe3d06dbfff650324ee5423
-
SHA1
d1a981df9335f9c919867d74b21c8da4e0f916ea
-
SHA256
cf5f43430ccbe712ff53ea600e41bbc4ab23309177d5dcc9e8731bd9241a32af
-
SHA512
c6542be6556275cf0e626d7d994ccc0708c6fede82745f95a512b91477b493fdff54260951bc6125ecbd4f379a12975457ee94c22b2c5d4cecdca02274e66c3f
-
SSDEEP
12288:zPDlvTBVyh5BU3CymAZ7s3/SZcCANyk2IBk7ruHMSCxhZ7r7GjHJGvqU3Wau2+Yj:DfkhbU3NmFCXk2IBk7aqujrUGau6
Malware Config
Extracted
darkcomet
17
trying2.no-ip.org:1074
DC_MUTEX-2WLTF4G
-
gencode
CJrWLeRancol
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 2244 svchost.exe -
Loads dropped DLL 1 IoCs
Processes:
0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exepid process 108 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\tmp2138 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp2137.tmp.exe\"" 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exedescription pid process target process PID 108 set thread context of 2244 108 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
Processes:
0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exepid process 108 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exesvchost.exedescription pid process Token: SeDebugPrivilege 108 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2244 svchost.exe Token: SeSecurityPrivilege 2244 svchost.exe Token: SeTakeOwnershipPrivilege 2244 svchost.exe Token: SeLoadDriverPrivilege 2244 svchost.exe Token: SeSystemProfilePrivilege 2244 svchost.exe Token: SeSystemtimePrivilege 2244 svchost.exe Token: SeProfSingleProcessPrivilege 2244 svchost.exe Token: SeIncBasePriorityPrivilege 2244 svchost.exe Token: SeCreatePagefilePrivilege 2244 svchost.exe Token: SeBackupPrivilege 2244 svchost.exe Token: SeRestorePrivilege 2244 svchost.exe Token: SeShutdownPrivilege 2244 svchost.exe Token: SeDebugPrivilege 2244 svchost.exe Token: SeSystemEnvironmentPrivilege 2244 svchost.exe Token: SeChangeNotifyPrivilege 2244 svchost.exe Token: SeRemoteShutdownPrivilege 2244 svchost.exe Token: SeUndockPrivilege 2244 svchost.exe Token: SeManageVolumePrivilege 2244 svchost.exe Token: SeImpersonatePrivilege 2244 svchost.exe Token: SeCreateGlobalPrivilege 2244 svchost.exe Token: 33 2244 svchost.exe Token: 34 2244 svchost.exe Token: 35 2244 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid process 2244 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exedescription pid process target process PID 108 wrote to memory of 2244 108 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe svchost.exe PID 108 wrote to memory of 2244 108 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe svchost.exe PID 108 wrote to memory of 2244 108 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe svchost.exe PID 108 wrote to memory of 2244 108 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe svchost.exe PID 108 wrote to memory of 2244 108 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe svchost.exe PID 108 wrote to memory of 2244 108 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe svchost.exe PID 108 wrote to memory of 2244 108 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe svchost.exe PID 108 wrote to memory of 2244 108 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe svchost.exe PID 108 wrote to memory of 2244 108 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe svchost.exe PID 108 wrote to memory of 2244 108 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe svchost.exe PID 108 wrote to memory of 2244 108 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe svchost.exe PID 108 wrote to memory of 2244 108 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe svchost.exe PID 108 wrote to memory of 2244 108 0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0308c1516fe3d06dbfff650324ee5423_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
memory/108-0-0x0000000074CAE000-0x0000000074CAF000-memory.dmpFilesize
4KB
-
memory/108-1-0x0000000001340000-0x0000000001434000-memory.dmpFilesize
976KB
-
memory/108-2-0x0000000000270000-0x000000000027A000-memory.dmpFilesize
40KB
-
memory/108-4-0x0000000000B20000-0x0000000000BD5000-memory.dmpFilesize
724KB
-
memory/2244-21-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-27-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-20-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-18-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2244-15-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-14-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-13-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-10-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-9-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-11-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-8-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-29-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-30-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-28-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-12-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-31-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-32-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-33-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-34-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-35-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-36-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-37-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-38-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-39-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-40-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-41-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-42-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-43-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2244-44-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB