Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
26-06-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe
-
Size
276KB
-
MD5
130f632f634bfd9d35c3a34ae930828f
-
SHA1
90c795fa5fd9ac4b978e4336e1da7de97da794cc
-
SHA256
7740615ca20f45082d37e1bb40f8627b5228de5117659a2630281c9e8e73b4d6
-
SHA512
8b2a2ef55a7e69efb21a89299edf85ff3f476b14390e09982c69d0eeed2abb3fcc8e641b8c572bb23a08ef5a4688d6f34eaca30b95c71537b394b514693151d8
-
SSDEEP
6144:UYq5Ijq/cwOwwjkieWU0S2+vdUIehdW5tT914YIGwN2:g5IjL/wwhSFvjUW5W3b2
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-F54S21D
-
gencode
fVRrFeJaQvRk
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2524-11-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2524-12-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2524-10-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2524-7-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2524-6-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2524-13-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2524-15-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2524-14-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2524-17-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2524-18-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2524-19-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2524-20-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2524-22-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2524-23-0x0000000000400000-0x00000000004BA000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exedescription pid process target process PID 1044 set thread context of 2524 1044 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exedescription pid process Token: SeIncreaseQuotaPrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeSecurityPrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeSystemtimePrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeBackupPrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeRestorePrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeShutdownPrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeDebugPrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeUndockPrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeManageVolumePrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeImpersonatePrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: 33 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: 34 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe Token: 35 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exepid process 1044 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe 2524 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exedescription pid process target process PID 1044 wrote to memory of 2524 1044 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe PID 1044 wrote to memory of 2524 1044 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe PID 1044 wrote to memory of 2524 1044 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe PID 1044 wrote to memory of 2524 1044 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe PID 1044 wrote to memory of 2524 1044 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe PID 1044 wrote to memory of 2524 1044 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe PID 1044 wrote to memory of 2524 1044 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe PID 1044 wrote to memory of 2524 1044 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe 130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\130f632f634bfd9d35c3a34ae930828f_JaffaCakes118.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2524-4-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2524-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2524-11-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2524-12-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2524-10-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2524-7-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2524-6-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2524-13-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2524-15-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2524-14-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2524-16-0x00000000003C0000-0x00000000003C1000-memory.dmpFilesize
4KB
-
memory/2524-17-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2524-18-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2524-19-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2524-20-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2524-21-0x00000000003C0000-0x00000000003C1000-memory.dmpFilesize
4KB
-
memory/2524-22-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2524-23-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB