Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 19:10
Static task
static1
Behavioral task
behavioral1
Sample
0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe
-
Size
958KB
-
MD5
0a5581b73f12f54b73aae0ce0dafd6ec
-
SHA1
9c35b8268f0b9d311f302ef3b242f18d652dcdca
-
SHA256
72c9070be456333066ed0e73a025c86b0d6ddbca01d536654dd248b8e567e66e
-
SHA512
08051bf0041b45228704b2b6d17b4a9d73502bc1cba27295014acc5b84c25203e612241449d33570e343f90e270cb6c613dff08d8a969fc5806c4e6c3a3aad03
-
SSDEEP
12288:VCCBiBFRiCnO361gsCEBR1+cXpSSEDpJdHbmpu5Ac8/oGCaU/6ouMXOvnFdNDR07:VhMviWX2LiQSAQQf5yow3wj
Malware Config
Extracted
darkcomet
Guest16
inglap.no-ip.org:8547
DC_MUTEX-MNKUWVZ
-
gencode
hTSvsnbrAh61
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Micro = "C:\\Users\\Admin\\AppData\\Local\\Temp\\soft.exe" 0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exevbc.exedescription pid process target process PID 2180 set thread context of 2388 2180 0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe vbc.exe PID 2388 set thread context of 2940 2388 vbc.exe iexplore.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
vbc.exedescription pid process Token: SeIncreaseQuotaPrivilege 2388 vbc.exe Token: SeSecurityPrivilege 2388 vbc.exe Token: SeTakeOwnershipPrivilege 2388 vbc.exe Token: SeLoadDriverPrivilege 2388 vbc.exe Token: SeSystemProfilePrivilege 2388 vbc.exe Token: SeSystemtimePrivilege 2388 vbc.exe Token: SeProfSingleProcessPrivilege 2388 vbc.exe Token: SeIncBasePriorityPrivilege 2388 vbc.exe Token: SeCreatePagefilePrivilege 2388 vbc.exe Token: SeBackupPrivilege 2388 vbc.exe Token: SeRestorePrivilege 2388 vbc.exe Token: SeShutdownPrivilege 2388 vbc.exe Token: SeDebugPrivilege 2388 vbc.exe Token: SeSystemEnvironmentPrivilege 2388 vbc.exe Token: SeChangeNotifyPrivilege 2388 vbc.exe Token: SeRemoteShutdownPrivilege 2388 vbc.exe Token: SeUndockPrivilege 2388 vbc.exe Token: SeManageVolumePrivilege 2388 vbc.exe Token: SeImpersonatePrivilege 2388 vbc.exe Token: SeCreateGlobalPrivilege 2388 vbc.exe Token: 33 2388 vbc.exe Token: 34 2388 vbc.exe Token: 35 2388 vbc.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exevbc.exedescription pid process target process PID 2180 wrote to memory of 2388 2180 0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe vbc.exe PID 2180 wrote to memory of 2388 2180 0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe vbc.exe PID 2180 wrote to memory of 2388 2180 0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe vbc.exe PID 2180 wrote to memory of 2388 2180 0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe vbc.exe PID 2180 wrote to memory of 2388 2180 0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe vbc.exe PID 2180 wrote to memory of 2388 2180 0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe vbc.exe PID 2180 wrote to memory of 2388 2180 0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe vbc.exe PID 2180 wrote to memory of 2388 2180 0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe vbc.exe PID 2180 wrote to memory of 2388 2180 0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe vbc.exe PID 2180 wrote to memory of 2388 2180 0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe vbc.exe PID 2180 wrote to memory of 2388 2180 0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe vbc.exe PID 2180 wrote to memory of 2388 2180 0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe vbc.exe PID 2180 wrote to memory of 2388 2180 0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe vbc.exe PID 2388 wrote to memory of 2940 2388 vbc.exe iexplore.exe PID 2388 wrote to memory of 2940 2388 vbc.exe iexplore.exe PID 2388 wrote to memory of 2940 2388 vbc.exe iexplore.exe PID 2388 wrote to memory of 2940 2388 vbc.exe iexplore.exe PID 2388 wrote to memory of 2940 2388 vbc.exe iexplore.exe PID 2388 wrote to memory of 2940 2388 vbc.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a5581b73f12f54b73aae0ce0dafd6ec_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2180-0-0x0000000074821000-0x0000000074822000-memory.dmpFilesize
4KB
-
memory/2180-1-0x0000000074820000-0x0000000074DCB000-memory.dmpFilesize
5.7MB
-
memory/2180-2-0x0000000074820000-0x0000000074DCB000-memory.dmpFilesize
5.7MB
-
memory/2180-25-0x0000000074820000-0x0000000074DCB000-memory.dmpFilesize
5.7MB
-
memory/2388-13-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2388-9-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2388-21-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2388-19-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2388-17-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2388-15-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2388-5-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2388-22-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2388-7-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2388-11-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2388-24-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2388-26-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2388-3-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2388-31-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2388-27-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2940-28-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB