Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 06:51
Static task
static1
Behavioral task
behavioral1
Sample
381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe
-
Size
706KB
-
MD5
381b4d709ba547d3a6771aef0d0f1bfb
-
SHA1
cf6a0432f24349883b3f0a6da7382f19d6abebc5
-
SHA256
9a416d5bf4b952c86a75dffb498ee31ff0e0a7ac9cf91af8ca7fdea44323f4bd
-
SHA512
bbb1a66d87ca25f5aa5230c2cf7b5b43163dea36f16d761dfa7dbffcd402793ea3b9febd87ea1c3b2aa58ac165d10dff7c6a9f0dd412a29f74adc41439c8b5e3
-
SSDEEP
12288:XdbQIwxmjZew99ENoOLaJpL7MJX32/1SPpSLqx9QkScLdR1pi0:94Mew99ENoGaJpLqXoc8q7mmzV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1600 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\DarkCometRAT = "C:\\test\\svchost.exe" 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeSecurityPrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeLoadDriverPrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeSystemProfilePrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeSystemtimePrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeBackupPrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeRestorePrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeShutdownPrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeDebugPrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeUndockPrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeManageVolumePrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeImpersonatePrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: 33 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: 34 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: 35 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 1600 svchost.exe Token: SeSecurityPrivilege 1600 svchost.exe Token: SeTakeOwnershipPrivilege 1600 svchost.exe Token: SeLoadDriverPrivilege 1600 svchost.exe Token: SeSystemProfilePrivilege 1600 svchost.exe Token: SeSystemtimePrivilege 1600 svchost.exe Token: SeProfSingleProcessPrivilege 1600 svchost.exe Token: SeIncBasePriorityPrivilege 1600 svchost.exe Token: SeCreatePagefilePrivilege 1600 svchost.exe Token: SeBackupPrivilege 1600 svchost.exe Token: SeRestorePrivilege 1600 svchost.exe Token: SeShutdownPrivilege 1600 svchost.exe Token: SeDebugPrivilege 1600 svchost.exe Token: SeSystemEnvironmentPrivilege 1600 svchost.exe Token: SeChangeNotifyPrivilege 1600 svchost.exe Token: SeRemoteShutdownPrivilege 1600 svchost.exe Token: SeUndockPrivilege 1600 svchost.exe Token: SeManageVolumePrivilege 1600 svchost.exe Token: SeImpersonatePrivilege 1600 svchost.exe Token: SeCreateGlobalPrivilege 1600 svchost.exe Token: 33 1600 svchost.exe Token: 34 1600 svchost.exe Token: 35 1600 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1512 wrote to memory of 1600 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe 30 PID 1512 wrote to memory of 1600 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe 30 PID 1512 wrote to memory of 1600 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe 30 PID 1512 wrote to memory of 1600 1512 381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\381b4d709ba547d3a6771aef0d0f1bfb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\test\svchost.exe"C:\test\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD5381b4d709ba547d3a6771aef0d0f1bfb
SHA1cf6a0432f24349883b3f0a6da7382f19d6abebc5
SHA2569a416d5bf4b952c86a75dffb498ee31ff0e0a7ac9cf91af8ca7fdea44323f4bd
SHA512bbb1a66d87ca25f5aa5230c2cf7b5b43163dea36f16d761dfa7dbffcd402793ea3b9febd87ea1c3b2aa58ac165d10dff7c6a9f0dd412a29f74adc41439c8b5e3