Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
26-06-2024 23:07
Static task
static1
Behavioral task
behavioral1
Sample
13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe
-
Size
291KB
-
MD5
13d24c688ccb4dcb94b3938e703c1214
-
SHA1
ea5184bbded2ed09a0e1a0c1a6782dc036c5af41
-
SHA256
37f9cee4a060f3a0db69833344d590afe89e745cb1a0d5f669ac72cb8fb6e030
-
SHA512
cb4f148bc0477c24d24f147f3b313470a59c46af1fe25a1706a34ca39eb060038c63140c22d20b4d1d28f71b54ebd2e7285487049106c6cffcfa193058fa452a
-
SSDEEP
6144:Qf1f8zsg98ZCHKCALbSsNO8DUfH3c+kn26cZ1Rxd6GbKF/v/AYh:Qf1fatHKCALpObfLkyVcqYh
Malware Config
Extracted
darkcomet
Guest16
b6x.no-ip.biz:1604
DC_MUTEX-2FXZTDM
-
gencode
SUpeha8zaHc2
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
webengine.exeMSBuild.exepid process 1884 webengine.exe 2584 MSBuild.exe -
Loads dropped DLL 2 IoCs
Processes:
13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exewebengine.exepid process 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 1884 webengine.exe -
Processes:
resource yara_rule behavioral1/memory/1784-9-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1784-15-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1784-11-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1784-16-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1784-17-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1784-19-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1784-21-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1784-20-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1784-23-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1784-29-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1784-30-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1784-47-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
webengine.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\webengine.exe" webengine.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exeMSBuild.exedescription pid process target process PID 2328 set thread context of 1784 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 2584 set thread context of 2552 2584 MSBuild.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exewebengine.exeMSBuild.exepid process 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 2584 MSBuild.exe 1884 webengine.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
Processes:
13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exeAppLaunch.exewebengine.exeMSBuild.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 1784 AppLaunch.exe Token: SeSecurityPrivilege 1784 AppLaunch.exe Token: SeTakeOwnershipPrivilege 1784 AppLaunch.exe Token: SeLoadDriverPrivilege 1784 AppLaunch.exe Token: SeSystemProfilePrivilege 1784 AppLaunch.exe Token: SeSystemtimePrivilege 1784 AppLaunch.exe Token: SeProfSingleProcessPrivilege 1784 AppLaunch.exe Token: SeIncBasePriorityPrivilege 1784 AppLaunch.exe Token: SeCreatePagefilePrivilege 1784 AppLaunch.exe Token: SeBackupPrivilege 1784 AppLaunch.exe Token: SeRestorePrivilege 1784 AppLaunch.exe Token: SeShutdownPrivilege 1784 AppLaunch.exe Token: SeDebugPrivilege 1784 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 1784 AppLaunch.exe Token: SeChangeNotifyPrivilege 1784 AppLaunch.exe Token: SeRemoteShutdownPrivilege 1784 AppLaunch.exe Token: SeUndockPrivilege 1784 AppLaunch.exe Token: SeManageVolumePrivilege 1784 AppLaunch.exe Token: SeImpersonatePrivilege 1784 AppLaunch.exe Token: SeCreateGlobalPrivilege 1784 AppLaunch.exe Token: 33 1784 AppLaunch.exe Token: 34 1784 AppLaunch.exe Token: 35 1784 AppLaunch.exe Token: SeDebugPrivilege 1884 webengine.exe Token: SeDebugPrivilege 2584 MSBuild.exe Token: SeIncreaseQuotaPrivilege 2552 AppLaunch.exe Token: SeSecurityPrivilege 2552 AppLaunch.exe Token: SeTakeOwnershipPrivilege 2552 AppLaunch.exe Token: SeLoadDriverPrivilege 2552 AppLaunch.exe Token: SeSystemProfilePrivilege 2552 AppLaunch.exe Token: SeSystemtimePrivilege 2552 AppLaunch.exe Token: SeProfSingleProcessPrivilege 2552 AppLaunch.exe Token: SeIncBasePriorityPrivilege 2552 AppLaunch.exe Token: SeCreatePagefilePrivilege 2552 AppLaunch.exe Token: SeBackupPrivilege 2552 AppLaunch.exe Token: SeRestorePrivilege 2552 AppLaunch.exe Token: SeShutdownPrivilege 2552 AppLaunch.exe Token: SeDebugPrivilege 2552 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 2552 AppLaunch.exe Token: SeChangeNotifyPrivilege 2552 AppLaunch.exe Token: SeRemoteShutdownPrivilege 2552 AppLaunch.exe Token: SeUndockPrivilege 2552 AppLaunch.exe Token: SeManageVolumePrivilege 2552 AppLaunch.exe Token: SeImpersonatePrivilege 2552 AppLaunch.exe Token: SeCreateGlobalPrivilege 2552 AppLaunch.exe Token: 33 2552 AppLaunch.exe Token: 34 2552 AppLaunch.exe Token: 35 2552 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
AppLaunch.exepid process 1784 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exewebengine.exeMSBuild.exedescription pid process target process PID 2328 wrote to memory of 1784 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 2328 wrote to memory of 1784 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 2328 wrote to memory of 1784 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 2328 wrote to memory of 1784 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 2328 wrote to memory of 1784 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 2328 wrote to memory of 1784 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 2328 wrote to memory of 1784 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 2328 wrote to memory of 1784 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 2328 wrote to memory of 1784 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 2328 wrote to memory of 1784 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 2328 wrote to memory of 1784 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 2328 wrote to memory of 1884 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe webengine.exe PID 2328 wrote to memory of 1884 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe webengine.exe PID 2328 wrote to memory of 1884 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe webengine.exe PID 2328 wrote to memory of 1884 2328 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe webengine.exe PID 1884 wrote to memory of 2584 1884 webengine.exe MSBuild.exe PID 1884 wrote to memory of 2584 1884 webengine.exe MSBuild.exe PID 1884 wrote to memory of 2584 1884 webengine.exe MSBuild.exe PID 1884 wrote to memory of 2584 1884 webengine.exe MSBuild.exe PID 2584 wrote to memory of 2552 2584 MSBuild.exe AppLaunch.exe PID 2584 wrote to memory of 2552 2584 MSBuild.exe AppLaunch.exe PID 2584 wrote to memory of 2552 2584 MSBuild.exe AppLaunch.exe PID 2584 wrote to memory of 2552 2584 MSBuild.exe AppLaunch.exe PID 2584 wrote to memory of 2552 2584 MSBuild.exe AppLaunch.exe PID 2584 wrote to memory of 2552 2584 MSBuild.exe AppLaunch.exe PID 2584 wrote to memory of 2552 2584 MSBuild.exe AppLaunch.exe PID 2584 wrote to memory of 2552 2584 MSBuild.exe AppLaunch.exe PID 2584 wrote to memory of 2552 2584 MSBuild.exe AppLaunch.exe PID 2584 wrote to memory of 2552 2584 MSBuild.exe AppLaunch.exe PID 2584 wrote to memory of 2552 2584 MSBuild.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\webengine.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\webengine.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\MSBuild.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe4⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeFilesize
291KB
MD513d24c688ccb4dcb94b3938e703c1214
SHA1ea5184bbded2ed09a0e1a0c1a6782dc036c5af41
SHA25637f9cee4a060f3a0db69833344d590afe89e745cb1a0d5f669ac72cb8fb6e030
SHA512cb4f148bc0477c24d24f147f3b313470a59c46af1fe25a1706a34ca39eb060038c63140c22d20b4d1d28f71b54ebd2e7285487049106c6cffcfa193058fa452a
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\webengine.exeFilesize
9KB
MD55a19da48df184cd3bdbb514a3ef479ce
SHA164854ac93e3d399bf75cad4c83bca183528b60c1
SHA256831ba43d7f75aea5f825767cfab7ca2bce044b920db0dbc7b07f28614270dde7
SHA512cf50f3b57135e6c2ef1efec00a89b2ca2d443daf7de2faee30fd80776ccca4e7535f11777e1339e97932387a948b58ca5a5e55269421729da2a624c5e51f0fac
-
memory/1784-19-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/1784-21-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/1784-9-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/1784-15-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/1784-11-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/1784-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1784-16-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/1784-17-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/1784-47-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/1784-7-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/1784-20-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/1784-23-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/1784-30-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/1784-29-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2328-2-0x0000000074260000-0x000000007480B000-memory.dmpFilesize
5.7MB
-
memory/2328-1-0x0000000074260000-0x000000007480B000-memory.dmpFilesize
5.7MB
-
memory/2328-45-0x0000000074260000-0x000000007480B000-memory.dmpFilesize
5.7MB
-
memory/2328-46-0x0000000074260000-0x000000007480B000-memory.dmpFilesize
5.7MB
-
memory/2328-0-0x0000000074261000-0x0000000074262000-memory.dmpFilesize
4KB