Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 22:20
Static task
static1
Behavioral task
behavioral1
Sample
b545097b070ac19766a36b4617338363_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
b545097b070ac19766a36b4617338363_JaffaCakes118.exe
-
Size
918KB
-
MD5
b545097b070ac19766a36b4617338363
-
SHA1
bbec26108117802436b079099a357c04296093fc
-
SHA256
22fe32fd72a901239a5635d4fb6efe588e83812e10590cd64419c612e5649e24
-
SHA512
1881ae7735e9dda6f87a3aebe4d73ffd303dd0e44c18116f6da7966ecae9d2a91e87f3956e228eaa55abffaf30f080c6bafc1603d8d43d9c2923175722387b97
-
SSDEEP
24576:8gefGu8NaXaPkoekz4R7PbMxIozXVbv+4sQuTfpy1BGZ3s:au2iy7P0Bli4Q7peBU3
Malware Config
Extracted
darkcomet
darkz
gameserver2.zapto.org:1604
DC_MUTEX-59WS2LP
-
gencode
FCPYmHSjUERL
-
install
false
-
offline_keylogger
true
-
persistence
false
Extracted
latentbot
gameserver2.zapto.org
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
b545097b070ac19766a36b4617338363_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon.exe = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe" b545097b070ac19766a36b4617338363_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b545097b070ac19766a36b4617338363_JaffaCakes118.exedescription pid Process procid_target PID 2220 set thread context of 2808 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exevbc.exeb545097b070ac19766a36b4617338363_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b545097b070ac19766a36b4617338363_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
vbc.exedescription pid Process Token: SeIncreaseQuotaPrivilege 2808 vbc.exe Token: SeSecurityPrivilege 2808 vbc.exe Token: SeTakeOwnershipPrivilege 2808 vbc.exe Token: SeLoadDriverPrivilege 2808 vbc.exe Token: SeSystemProfilePrivilege 2808 vbc.exe Token: SeSystemtimePrivilege 2808 vbc.exe Token: SeProfSingleProcessPrivilege 2808 vbc.exe Token: SeIncBasePriorityPrivilege 2808 vbc.exe Token: SeCreatePagefilePrivilege 2808 vbc.exe Token: SeBackupPrivilege 2808 vbc.exe Token: SeRestorePrivilege 2808 vbc.exe Token: SeShutdownPrivilege 2808 vbc.exe Token: SeDebugPrivilege 2808 vbc.exe Token: SeSystemEnvironmentPrivilege 2808 vbc.exe Token: SeChangeNotifyPrivilege 2808 vbc.exe Token: SeRemoteShutdownPrivilege 2808 vbc.exe Token: SeUndockPrivilege 2808 vbc.exe Token: SeManageVolumePrivilege 2808 vbc.exe Token: SeImpersonatePrivilege 2808 vbc.exe Token: SeCreateGlobalPrivilege 2808 vbc.exe Token: 33 2808 vbc.exe Token: 34 2808 vbc.exe Token: 35 2808 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vbc.exepid Process 2808 vbc.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
b545097b070ac19766a36b4617338363_JaffaCakes118.exedescription pid Process procid_target PID 2220 wrote to memory of 2692 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2692 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2692 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2692 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 30 PID 2220 wrote to memory of 2808 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2808 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2808 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2808 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2808 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2808 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2808 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2808 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2808 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2808 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2808 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2808 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 32 PID 2220 wrote to memory of 2808 2220 b545097b070ac19766a36b4617338363_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b545097b070ac19766a36b4617338363_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b545097b070ac19766a36b4617338363_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ren C:\Users\Admin\AppData\Roaming\winlogon winlogon.exe && exit2⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
918KB
MD5b545097b070ac19766a36b4617338363
SHA1bbec26108117802436b079099a357c04296093fc
SHA25622fe32fd72a901239a5635d4fb6efe588e83812e10590cd64419c612e5649e24
SHA5121881ae7735e9dda6f87a3aebe4d73ffd303dd0e44c18116f6da7966ecae9d2a91e87f3956e228eaa55abffaf30f080c6bafc1603d8d43d9c2923175722387b97