Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 10:30
Static task
static1
Behavioral task
behavioral1
Sample
0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe
-
Size
725KB
-
MD5
0529d67672dae586e351a9ee52d41578
-
SHA1
b0b0f00591e257f0209680e764f3e7a89b6e4783
-
SHA256
7634a9fc59d55c2c6825af629eec999b3c8f59e1a00eba5afa672c93ce81bba1
-
SHA512
a6d496ab1df8f0e0d39957b712d3dc93ba95cfa7097e59d54037ed06034e948c61e90c4976e960bf8d7e0247447d2e8ffff20d3f1785add5742686d98886a09b
-
SSDEEP
12288:UR/MxDiuJuP8OVWXN2/Y321+Hl3aW0bRPwhWEI/XMmeFZGuKPr:Iuo0vNyerHl3aWIwhWD/XMlu
Malware Config
Extracted
darkcomet
bl4cks0ul.no-ip.info:1338
DC_MUTEX-W4MYS1V
-
gencode
pTh6taM9e32j
-
install
false
-
offline_keylogger
true
-
password
1234
-
persistence
false
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
networkexplorer.exewinrsmgr.exepid process 2172 networkexplorer.exe 3032 winrsmgr.exe -
Loads dropped DLL 4 IoCs
Processes:
0529d67672dae586e351a9ee52d41578_JaffaCakes118.exedw20.exenetworkexplorer.exepid process 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2508 dw20.exe 2172 networkexplorer.exe 2172 networkexplorer.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
0529d67672dae586e351a9ee52d41578_JaffaCakes118.exewinrsmgr.exedescription pid process target process PID 2884 set thread context of 2912 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe AppLaunch.exe PID 3032 set thread context of 308 3032 winrsmgr.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0529d67672dae586e351a9ee52d41578_JaffaCakes118.exenetworkexplorer.exewinrsmgr.exepid process 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2172 networkexplorer.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 3032 winrsmgr.exe 3032 winrsmgr.exe 2172 networkexplorer.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 3032 winrsmgr.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 3032 winrsmgr.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 3032 winrsmgr.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 3032 winrsmgr.exe 3032 winrsmgr.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 3032 winrsmgr.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 3032 winrsmgr.exe 2172 networkexplorer.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 3032 winrsmgr.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 3032 winrsmgr.exe 3032 winrsmgr.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 3032 winrsmgr.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 3032 winrsmgr.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 3032 winrsmgr.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 3032 winrsmgr.exe 2172 networkexplorer.exe 3032 winrsmgr.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 3032 winrsmgr.exe 3032 winrsmgr.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 3032 winrsmgr.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe 3032 winrsmgr.exe 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
Processes:
0529d67672dae586e351a9ee52d41578_JaffaCakes118.exeAppLaunch.exenetworkexplorer.exewinrsmgr.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2912 AppLaunch.exe Token: SeSecurityPrivilege 2912 AppLaunch.exe Token: SeTakeOwnershipPrivilege 2912 AppLaunch.exe Token: SeLoadDriverPrivilege 2912 AppLaunch.exe Token: SeSystemProfilePrivilege 2912 AppLaunch.exe Token: SeSystemtimePrivilege 2912 AppLaunch.exe Token: SeProfSingleProcessPrivilege 2912 AppLaunch.exe Token: SeIncBasePriorityPrivilege 2912 AppLaunch.exe Token: SeCreatePagefilePrivilege 2912 AppLaunch.exe Token: SeBackupPrivilege 2912 AppLaunch.exe Token: SeRestorePrivilege 2912 AppLaunch.exe Token: SeShutdownPrivilege 2912 AppLaunch.exe Token: SeDebugPrivilege 2912 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 2912 AppLaunch.exe Token: SeChangeNotifyPrivilege 2912 AppLaunch.exe Token: SeRemoteShutdownPrivilege 2912 AppLaunch.exe Token: SeUndockPrivilege 2912 AppLaunch.exe Token: SeManageVolumePrivilege 2912 AppLaunch.exe Token: SeImpersonatePrivilege 2912 AppLaunch.exe Token: SeCreateGlobalPrivilege 2912 AppLaunch.exe Token: 33 2912 AppLaunch.exe Token: 34 2912 AppLaunch.exe Token: 35 2912 AppLaunch.exe Token: SeDebugPrivilege 2172 networkexplorer.exe Token: SeDebugPrivilege 3032 winrsmgr.exe Token: SeIncreaseQuotaPrivilege 308 AppLaunch.exe Token: SeSecurityPrivilege 308 AppLaunch.exe Token: SeTakeOwnershipPrivilege 308 AppLaunch.exe Token: SeLoadDriverPrivilege 308 AppLaunch.exe Token: SeSystemProfilePrivilege 308 AppLaunch.exe Token: SeSystemtimePrivilege 308 AppLaunch.exe Token: SeProfSingleProcessPrivilege 308 AppLaunch.exe Token: SeIncBasePriorityPrivilege 308 AppLaunch.exe Token: SeCreatePagefilePrivilege 308 AppLaunch.exe Token: SeBackupPrivilege 308 AppLaunch.exe Token: SeRestorePrivilege 308 AppLaunch.exe Token: SeShutdownPrivilege 308 AppLaunch.exe Token: SeDebugPrivilege 308 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 308 AppLaunch.exe Token: SeChangeNotifyPrivilege 308 AppLaunch.exe Token: SeRemoteShutdownPrivilege 308 AppLaunch.exe Token: SeUndockPrivilege 308 AppLaunch.exe Token: SeManageVolumePrivilege 308 AppLaunch.exe Token: SeImpersonatePrivilege 308 AppLaunch.exe Token: SeCreateGlobalPrivilege 308 AppLaunch.exe Token: 33 308 AppLaunch.exe Token: 34 308 AppLaunch.exe Token: 35 308 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
AppLaunch.exepid process 2912 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0529d67672dae586e351a9ee52d41578_JaffaCakes118.exeAppLaunch.exenetworkexplorer.exewinrsmgr.exedescription pid process target process PID 2884 wrote to memory of 2912 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe AppLaunch.exe PID 2884 wrote to memory of 2912 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe AppLaunch.exe PID 2884 wrote to memory of 2912 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe AppLaunch.exe PID 2884 wrote to memory of 2912 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe AppLaunch.exe PID 2884 wrote to memory of 2912 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe AppLaunch.exe PID 2884 wrote to memory of 2912 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe AppLaunch.exe PID 2884 wrote to memory of 2912 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe AppLaunch.exe PID 2884 wrote to memory of 2912 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe AppLaunch.exe PID 2884 wrote to memory of 2912 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe AppLaunch.exe PID 2884 wrote to memory of 2912 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe AppLaunch.exe PID 2884 wrote to memory of 2912 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe AppLaunch.exe PID 2884 wrote to memory of 2912 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe AppLaunch.exe PID 2884 wrote to memory of 2912 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe AppLaunch.exe PID 2884 wrote to memory of 2912 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe AppLaunch.exe PID 2884 wrote to memory of 2912 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe AppLaunch.exe PID 2884 wrote to memory of 2912 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe AppLaunch.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2912 wrote to memory of 2792 2912 AppLaunch.exe notepad.exe PID 2884 wrote to memory of 2172 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe networkexplorer.exe PID 2884 wrote to memory of 2172 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe networkexplorer.exe PID 2884 wrote to memory of 2172 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe networkexplorer.exe PID 2884 wrote to memory of 2172 2884 0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe networkexplorer.exe PID 2172 wrote to memory of 2508 2172 networkexplorer.exe dw20.exe PID 2172 wrote to memory of 2508 2172 networkexplorer.exe dw20.exe PID 2172 wrote to memory of 2508 2172 networkexplorer.exe dw20.exe PID 2172 wrote to memory of 2508 2172 networkexplorer.exe dw20.exe PID 2172 wrote to memory of 3032 2172 networkexplorer.exe winrsmgr.exe PID 2172 wrote to memory of 3032 2172 networkexplorer.exe winrsmgr.exe PID 2172 wrote to memory of 3032 2172 networkexplorer.exe winrsmgr.exe PID 2172 wrote to memory of 3032 2172 networkexplorer.exe winrsmgr.exe PID 3032 wrote to memory of 308 3032 winrsmgr.exe AppLaunch.exe PID 3032 wrote to memory of 308 3032 winrsmgr.exe AppLaunch.exe PID 3032 wrote to memory of 308 3032 winrsmgr.exe AppLaunch.exe PID 3032 wrote to memory of 308 3032 winrsmgr.exe AppLaunch.exe PID 3032 wrote to memory of 308 3032 winrsmgr.exe AppLaunch.exe PID 3032 wrote to memory of 308 3032 winrsmgr.exe AppLaunch.exe PID 3032 wrote to memory of 308 3032 winrsmgr.exe AppLaunch.exe PID 3032 wrote to memory of 308 3032 winrsmgr.exe AppLaunch.exe PID 3032 wrote to memory of 308 3032 winrsmgr.exe AppLaunch.exe PID 3032 wrote to memory of 308 3032 winrsmgr.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0529d67672dae586e351a9ee52d41578_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\networkexplorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\networkexplorer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 5323⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\winrsmgr.exe"C:\Users\Admin\AppData\Local\Temp\winrsmgr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe4⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\winrsmgr.exeFilesize
725KB
MD50529d67672dae586e351a9ee52d41578
SHA1b0b0f00591e257f0209680e764f3e7a89b6e4783
SHA2567634a9fc59d55c2c6825af629eec999b3c8f59e1a00eba5afa672c93ce81bba1
SHA512a6d496ab1df8f0e0d39957b712d3dc93ba95cfa7097e59d54037ed06034e948c61e90c4976e960bf8d7e0247447d2e8ffff20d3f1785add5742686d98886a09b
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\networkexplorer.exeFilesize
7KB
MD50279c2146d62cae9662118f4e8800deb
SHA18d0da4b751a854bb0d915f3391a4bb90c439b7ed
SHA256995b97bbe99a22c37fe19b1f2119c652520f2d6871ab4f40dfddddc6bbe85efb
SHA512259afe5223f2354102fa5c6ebe12d7feb6be5d5039820052d81551e1ddb53308644b6649781b393da79c96c217eade74fc7620f1208bce4dc15b1b44bbac4001
-
memory/2792-29-0x0000000000090000-0x0000000000091000-memory.dmpFilesize
4KB
-
memory/2792-55-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2884-2-0x00000000744E0000-0x0000000074A8B000-memory.dmpFilesize
5.7MB
-
memory/2884-1-0x00000000744E0000-0x0000000074A8B000-memory.dmpFilesize
5.7MB
-
memory/2884-82-0x00000000744E0000-0x0000000074A8B000-memory.dmpFilesize
5.7MB
-
memory/2884-0-0x00000000744E1000-0x00000000744E2000-memory.dmpFilesize
4KB
-
memory/2912-24-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2912-19-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2912-13-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2912-23-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2912-9-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2912-11-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2912-25-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2912-27-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2912-28-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2912-17-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2912-21-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2912-57-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2912-56-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2912-15-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2912-8-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2912-7-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2912-83-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB