Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe
-
Size
629KB
-
MD5
22dc5d62c2c40824901f2a5517e8029c
-
SHA1
4141e70636c8b08e4a5ec8cc9520065a73090d37
-
SHA256
123632b9babaa3e3f16e508c26e2a60f33c5edf896a9146819f83508250157fb
-
SHA512
77358ab753c43964bff84448f218854a01aea3cefd77288e1fa2b89ba79f0084726ec47a64703df9600c5ba7f5c5f67b4f40d6e58f8739e8fd47ef802da683a4
-
SSDEEP
12288:lew0ZLatzDCneocNspaFpmqdbX/hUb+XjRikc0ijv/tNC:sLZGtzDCndc6QFpmqRX/GbEe0ipI
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:90
DC_MUTEX-F54S21D
-
gencode
kpDRvFaHMVJE
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
resource yara_rule behavioral1/memory/1972-12-0x0000000000400000-0x0000000000532000-memory.dmp upx behavioral1/memory/1972-15-0x0000000000400000-0x0000000000532000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeSecurityPrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeLoadDriverPrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeSystemProfilePrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeSystemtimePrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeBackupPrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeRestorePrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeShutdownPrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeDebugPrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeUndockPrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeManageVolumePrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeImpersonatePrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: 33 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: 34 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe Token: 35 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1972 22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\22dc5d62c2c40824901f2a5517e8029c_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1972
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5d51da87dd1d685c086ad25bb83fd4962
SHA110e4f3ac00b1fd67ab5fd7028c12ca1b397bd94c
SHA2561db7db80595bd8b1642396f41ed660e46dd6b787ac2015cc4827999fc4a31446
SHA5122e5700976136928066301dbce9bb57d620fad0ed4c019c59f7b0315881a55baee99a2aa0797add3fd7a31bd54642250e3feffdc4a447f97bacbc75e4505895e2