Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 15:12
Static task
static1
Behavioral task
behavioral1
Sample
701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe
-
Size
447KB
-
MD5
701de2f687f7c4165ad0e9dee78e4b0f
-
SHA1
231e478e623a2528ec6e8e1f27626cae290aa092
-
SHA256
3d9f6b814b52b4d4331323c0f61753e33c3b5974a5ca0a2285776104b2c7bfcb
-
SHA512
22b96914f539f027562b3569eba9ac025d581bced3a0c93d65e45fecd076478497bd6f68539c34f81c7b4da1037f60f2307efe37f225cbc09546c031ddfd3dbf
-
SSDEEP
6144:KDYQAG9GBswCWeZwplNaeL+wLBNDE5FLBFSkkGMnErSzvYwxKMMLG16c78x5j3Va:od9P8e0L+15FvS7iSzgFGV7Qb/9JpAX
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-23QE21R
-
gencode
gzqrfcD0DLNl
-
install
false
-
offline_keylogger
false
-
persistence
false
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1584-13-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1584-19-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1584-24-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1584-26-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1584-27-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1584-29-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1584-30-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1584-31-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1584-32-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral2/memory/1584-35-0x0000000000400000-0x00000000004C8000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exedescription pid process Token: SeIncreaseQuotaPrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeSecurityPrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeLoadDriverPrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeSystemProfilePrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeSystemtimePrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeBackupPrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeRestorePrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeShutdownPrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeDebugPrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeUndockPrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeManageVolumePrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeImpersonatePrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: 33 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: 34 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: 35 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe Token: 36 1584 701de2f687f7c4165ad0e9dee78e4b0f_JaffaCakes118.exe