Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 13:41
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe
Resource
win7-20240705-en
windows7-x64
4 signatures
150 seconds
General
-
Target
5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe
-
Size
527KB
-
MD5
5c2db70f99be448c7ce5eef4004e3b99
-
SHA1
4fa84d05e3d0764357795ebd5b74a5386a92752f
-
SHA256
7a097c0d98ef1eb154add34a8641bda4d9cec751c722cb1af1fae9aaef71cc78
-
SHA512
2f2123020258d28c6b83c32584e26ae505c40fb5b47121c5dd2cc22813b92d84bd7aa7dcc5d9df56fc6928d00e77adc977b1ebe9718968c1f6af7ba1c3d99b7f
-
SSDEEP
12288:Q9jXIMlSia8JyH8d3zScOC9Y/OiaWVVJL0GGCXNc/5:UjRNauycd3zSA19+Q+u5
Malware Config
Extracted
Family
darkcomet
Botnet
Guest16
C2
127.0.0.1:1604
Mutex
DC_MUTEX-0SR134T
Attributes
-
gencode
8QPKGQajuMgz
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeSecurityPrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeLoadDriverPrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeSystemProfilePrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeSystemtimePrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeBackupPrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeRestorePrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeShutdownPrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeDebugPrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeUndockPrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeManageVolumePrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeImpersonatePrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: 33 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: 34 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: 35 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe Token: 36 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4964 5c2db70f99be448c7ce5eef4004e3b99_JaffaCakes118.exe