Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-07-2024 02:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe
Resource
win7-20240704-en
6 signatures
150 seconds
General
-
Target
511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe
-
Size
336KB
-
MD5
511cc263f68d7a61763b79ec5444081e
-
SHA1
28e041a383ecfbb4efc3fd22352313adcbbf6a5c
-
SHA256
89869e327940caa8a7de6aa106598d2e5f561f7156dbd516d283a59ef99b405f
-
SHA512
9c3166bf2bbd157aeee0f27fb306fa09657c47f83263efe6777022350233a1a84235226ee5bc0419d2516c62ddf28c2efdf6e7f3285a6b63b10a09e9bd2105d3
-
SSDEEP
6144:FG78LjzOANvSAsQLqF9pXMiY3sGB6UduRfLtcl:07kmAN6omFMb3sGB6UduRfLal
Malware Config
Extracted
Family
latentbot
C2
darkcomet30.zapto.org
Signatures
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\CKR3CSONHO.exe = "C:\\Users\\Admin\\AppData\\Roaming\\CKR3CSONHO.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 1484 reg.exe 2656 reg.exe 2348 reg.exe 1928 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeCreateTokenPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeAssignPrimaryTokenPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeLockMemoryPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeMachineAccountPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeTcbPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeSecurityPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeSystemtimePrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeCreatePermanentPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeBackupPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeRestorePrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeShutdownPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeDebugPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeAuditPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeUndockPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeSyncAgentPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeEnableDelegationPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeManageVolumePrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeImpersonatePrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: 31 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: 32 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: 33 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: 34 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: 35 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe Token: SeDebugPrivilege 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2476 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 30 PID 2076 wrote to memory of 2476 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 30 PID 2076 wrote to memory of 2476 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 30 PID 2076 wrote to memory of 2476 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 30 PID 2076 wrote to memory of 2056 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 31 PID 2076 wrote to memory of 2056 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 31 PID 2076 wrote to memory of 2056 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 31 PID 2076 wrote to memory of 2056 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 31 PID 2076 wrote to memory of 1496 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 32 PID 2076 wrote to memory of 1496 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 32 PID 2076 wrote to memory of 1496 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 32 PID 2076 wrote to memory of 1496 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 32 PID 2076 wrote to memory of 536 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 33 PID 2076 wrote to memory of 536 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 33 PID 2076 wrote to memory of 536 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 33 PID 2076 wrote to memory of 536 2076 511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe 33 PID 2056 wrote to memory of 2656 2056 cmd.exe 38 PID 2056 wrote to memory of 2656 2056 cmd.exe 38 PID 2056 wrote to memory of 2656 2056 cmd.exe 38 PID 2056 wrote to memory of 2656 2056 cmd.exe 38 PID 1496 wrote to memory of 2348 1496 cmd.exe 40 PID 1496 wrote to memory of 2348 1496 cmd.exe 40 PID 1496 wrote to memory of 2348 1496 cmd.exe 40 PID 1496 wrote to memory of 2348 1496 cmd.exe 40 PID 2476 wrote to memory of 1484 2476 cmd.exe 39 PID 2476 wrote to memory of 1484 2476 cmd.exe 39 PID 2476 wrote to memory of 1484 2476 cmd.exe 39 PID 2476 wrote to memory of 1484 2476 cmd.exe 39 PID 536 wrote to memory of 1928 536 cmd.exe 41 PID 536 wrote to memory of 1928 536 cmd.exe 41 PID 536 wrote to memory of 1928 536 cmd.exe 41 PID 536 wrote to memory of 1928 536 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Modifies firewall policy service
- Modifies registry key
PID:1484
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe:*:Enabled:Windows Messanger" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\511cc263f68d7a61763b79ec5444081e_JaffaCakes118.exe:*:Enabled:Windows Messanger" /f3⤵
- Modifies firewall policy service
- Modifies registry key
PID:2656
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Modifies firewall policy service
- Modifies registry key
PID:2348
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\CKR3CSONHO.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\CKR3CSONHO.exe:*:Enabled:Windows Messanger" /f2⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\CKR3CSONHO.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\CKR3CSONHO.exe:*:Enabled:Windows Messanger" /f3⤵
- Modifies firewall policy service
- Modifies registry key
PID:1928
-
-