Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 23:07
Static task
static1
Behavioral task
behavioral1
Sample
13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe
-
Size
291KB
-
MD5
13d24c688ccb4dcb94b3938e703c1214
-
SHA1
ea5184bbded2ed09a0e1a0c1a6782dc036c5af41
-
SHA256
37f9cee4a060f3a0db69833344d590afe89e745cb1a0d5f669ac72cb8fb6e030
-
SHA512
cb4f148bc0477c24d24f147f3b313470a59c46af1fe25a1706a34ca39eb060038c63140c22d20b4d1d28f71b54ebd2e7285487049106c6cffcfa193058fa452a
-
SSDEEP
6144:Qf1f8zsg98ZCHKCALbSsNO8DUfH3c+kn26cZ1Rxd6GbKF/v/AYh:Qf1fatHKCALpObfLkyVcqYh
Malware Config
Extracted
darkcomet
Guest16
b6x.no-ip.biz:1604
DC_MUTEX-2FXZTDM
-
gencode
SUpeha8zaHc2
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exewebengine.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation webengine.exe -
Executes dropped EXE 2 IoCs
Processes:
webengine.exeMSBuild.exepid process 4516 webengine.exe 2972 MSBuild.exe -
Processes:
resource yara_rule behavioral2/memory/212-7-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/212-8-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/212-11-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/212-10-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/212-9-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/212-13-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral2/memory/212-14-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
webengine.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\webengine.exe" webengine.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exeMSBuild.exedescription pid process target process PID 4812 set thread context of 212 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 2972 set thread context of 5088 2972 MSBuild.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exewebengine.exeMSBuild.exepid process 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe 2972 MSBuild.exe 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe 4516 webengine.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
Processes:
13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exeAppLaunch.exewebengine.exeMSBuild.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 212 AppLaunch.exe Token: SeSecurityPrivilege 212 AppLaunch.exe Token: SeTakeOwnershipPrivilege 212 AppLaunch.exe Token: SeLoadDriverPrivilege 212 AppLaunch.exe Token: SeSystemProfilePrivilege 212 AppLaunch.exe Token: SeSystemtimePrivilege 212 AppLaunch.exe Token: SeProfSingleProcessPrivilege 212 AppLaunch.exe Token: SeIncBasePriorityPrivilege 212 AppLaunch.exe Token: SeCreatePagefilePrivilege 212 AppLaunch.exe Token: SeBackupPrivilege 212 AppLaunch.exe Token: SeRestorePrivilege 212 AppLaunch.exe Token: SeShutdownPrivilege 212 AppLaunch.exe Token: SeDebugPrivilege 212 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 212 AppLaunch.exe Token: SeChangeNotifyPrivilege 212 AppLaunch.exe Token: SeRemoteShutdownPrivilege 212 AppLaunch.exe Token: SeUndockPrivilege 212 AppLaunch.exe Token: SeManageVolumePrivilege 212 AppLaunch.exe Token: SeImpersonatePrivilege 212 AppLaunch.exe Token: SeCreateGlobalPrivilege 212 AppLaunch.exe Token: 33 212 AppLaunch.exe Token: 34 212 AppLaunch.exe Token: 35 212 AppLaunch.exe Token: 36 212 AppLaunch.exe Token: SeDebugPrivilege 4516 webengine.exe Token: SeDebugPrivilege 2972 MSBuild.exe Token: SeIncreaseQuotaPrivilege 5088 AppLaunch.exe Token: SeSecurityPrivilege 5088 AppLaunch.exe Token: SeTakeOwnershipPrivilege 5088 AppLaunch.exe Token: SeLoadDriverPrivilege 5088 AppLaunch.exe Token: SeSystemProfilePrivilege 5088 AppLaunch.exe Token: SeSystemtimePrivilege 5088 AppLaunch.exe Token: SeProfSingleProcessPrivilege 5088 AppLaunch.exe Token: SeIncBasePriorityPrivilege 5088 AppLaunch.exe Token: SeCreatePagefilePrivilege 5088 AppLaunch.exe Token: SeBackupPrivilege 5088 AppLaunch.exe Token: SeRestorePrivilege 5088 AppLaunch.exe Token: SeShutdownPrivilege 5088 AppLaunch.exe Token: SeDebugPrivilege 5088 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 5088 AppLaunch.exe Token: SeChangeNotifyPrivilege 5088 AppLaunch.exe Token: SeRemoteShutdownPrivilege 5088 AppLaunch.exe Token: SeUndockPrivilege 5088 AppLaunch.exe Token: SeManageVolumePrivilege 5088 AppLaunch.exe Token: SeImpersonatePrivilege 5088 AppLaunch.exe Token: SeCreateGlobalPrivilege 5088 AppLaunch.exe Token: 33 5088 AppLaunch.exe Token: 34 5088 AppLaunch.exe Token: 35 5088 AppLaunch.exe Token: 36 5088 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
AppLaunch.exepid process 212 AppLaunch.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exewebengine.exeMSBuild.exedescription pid process target process PID 4812 wrote to memory of 212 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 4812 wrote to memory of 212 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 4812 wrote to memory of 212 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 4812 wrote to memory of 212 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 4812 wrote to memory of 212 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 4812 wrote to memory of 212 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 4812 wrote to memory of 212 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 4812 wrote to memory of 212 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe AppLaunch.exe PID 4812 wrote to memory of 4516 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe webengine.exe PID 4812 wrote to memory of 4516 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe webengine.exe PID 4812 wrote to memory of 4516 4812 13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe webengine.exe PID 4516 wrote to memory of 2972 4516 webengine.exe MSBuild.exe PID 4516 wrote to memory of 2972 4516 webengine.exe MSBuild.exe PID 4516 wrote to memory of 2972 4516 webengine.exe MSBuild.exe PID 2972 wrote to memory of 5088 2972 MSBuild.exe AppLaunch.exe PID 2972 wrote to memory of 5088 2972 MSBuild.exe AppLaunch.exe PID 2972 wrote to memory of 5088 2972 MSBuild.exe AppLaunch.exe PID 2972 wrote to memory of 5088 2972 MSBuild.exe AppLaunch.exe PID 2972 wrote to memory of 5088 2972 MSBuild.exe AppLaunch.exe PID 2972 wrote to memory of 5088 2972 MSBuild.exe AppLaunch.exe PID 2972 wrote to memory of 5088 2972 MSBuild.exe AppLaunch.exe PID 2972 wrote to memory of 5088 2972 MSBuild.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\13d24c688ccb4dcb94b3938e703c1214_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\webengine.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\webengine.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exe"C:\Users\Admin\AppData\Local\Temp\MSBuild.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4436,i,7012731823941922179,12386606396608877869,262144 --variations-seed-version --mojo-platform-channel-handle=3660 /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeFilesize
291KB
MD513d24c688ccb4dcb94b3938e703c1214
SHA1ea5184bbded2ed09a0e1a0c1a6782dc036c5af41
SHA25637f9cee4a060f3a0db69833344d590afe89e745cb1a0d5f669ac72cb8fb6e030
SHA512cb4f148bc0477c24d24f147f3b313470a59c46af1fe25a1706a34ca39eb060038c63140c22d20b4d1d28f71b54ebd2e7285487049106c6cffcfa193058fa452a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\webengine.exeFilesize
9KB
MD55a19da48df184cd3bdbb514a3ef479ce
SHA164854ac93e3d399bf75cad4c83bca183528b60c1
SHA256831ba43d7f75aea5f825767cfab7ca2bce044b920db0dbc7b07f28614270dde7
SHA512cf50f3b57135e6c2ef1efec00a89b2ca2d443daf7de2faee30fd80776ccca4e7535f11777e1339e97932387a948b58ca5a5e55269421729da2a624c5e51f0fac
-
memory/212-11-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/212-13-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/212-8-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/212-7-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/212-10-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/212-9-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/212-12-0x00000000022D0000-0x00000000022D1000-memory.dmpFilesize
4KB
-
memory/212-14-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4516-38-0x0000000075542000-0x0000000075543000-memory.dmpFilesize
4KB
-
memory/4516-40-0x0000000075540000-0x0000000075AF1000-memory.dmpFilesize
5.7MB
-
memory/4516-25-0x0000000075542000-0x0000000075543000-memory.dmpFilesize
4KB
-
memory/4516-26-0x0000000075540000-0x0000000075AF1000-memory.dmpFilesize
5.7MB
-
memory/4516-27-0x0000000075540000-0x0000000075AF1000-memory.dmpFilesize
5.7MB
-
memory/4516-39-0x0000000075540000-0x0000000075AF1000-memory.dmpFilesize
5.7MB
-
memory/4812-2-0x0000000075540000-0x0000000075AF1000-memory.dmpFilesize
5.7MB
-
memory/4812-36-0x0000000075542000-0x0000000075543000-memory.dmpFilesize
4KB
-
memory/4812-37-0x0000000075540000-0x0000000075AF1000-memory.dmpFilesize
5.7MB
-
memory/4812-35-0x0000000075540000-0x0000000075AF1000-memory.dmpFilesize
5.7MB
-
memory/4812-1-0x0000000075540000-0x0000000075AF1000-memory.dmpFilesize
5.7MB
-
memory/4812-0-0x0000000075542000-0x0000000075543000-memory.dmpFilesize
4KB