Analysis
-
max time kernel
148s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 20:48
Static task
static1
Behavioral task
behavioral1
Sample
1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe
-
Size
334KB
-
MD5
1778edf2a0945d71a0420fd7866fe091
-
SHA1
c2c703861bc6439b3f2acf60343467e748e49780
-
SHA256
20f85c0a4936edf859ba8d338bd6a7ccf38f0cdc0654285bd84419473a34bc71
-
SHA512
a98ea69351b407d7acebd1926042b23a163ab20f7315ac9fc478812bbe4f221629096d6c30901849d215e6afd1af616b9492c8023202dec393b4d5a984a408f6
-
SSDEEP
6144:l4RKROS24MILcMrddc56GiD7SIF93JaN1+hyj7YqLLDMdWnpQZh9h4:bROSlFrzcBiDuqNJij7YqMd0QZh9u
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-WP1AS8C
-
gencode
4Mwf3iWfxb9p
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exedescription pid process Token: SeIncreaseQuotaPrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeSecurityPrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeLoadDriverPrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeSystemProfilePrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeSystemtimePrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeBackupPrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeRestorePrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeShutdownPrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeDebugPrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeUndockPrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeManageVolumePrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeImpersonatePrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: 33 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: 34 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: 35 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe Token: 36 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exepid process 560 1778edf2a0945d71a0420fd7866fe091_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/560-0-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/560-1-0x0000000002110000-0x0000000002113000-memory.dmpFilesize
12KB
-
memory/560-2-0x0000000002170000-0x0000000002171000-memory.dmpFilesize
4KB
-
memory/560-3-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/560-5-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/560-6-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/560-7-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/560-8-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/560-10-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB
-
memory/560-16-0x0000000000400000-0x00000000004E5000-memory.dmpFilesize
916KB