Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 00:49
Static task
static1
Behavioral task
behavioral1
Sample
0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe
-
Size
712KB
-
MD5
0d2b4a88fb3d1db8e590ddb6d21a5b46
-
SHA1
bf975637496cae9c9ae2214927fa79c2bce55fe2
-
SHA256
c16cd744f3cf8fa1d76bf16f6bec5baacb4114f7cec92b2c843aad8848344027
-
SHA512
9cb5904570aa20cd8ba26e2f5dba7068974a8998e437493ceb4a802b2d9fa04b3c9889666801674e42713a2fc4220c23a8b3aa6bb922aebb28e1ac27f0370ee9
-
SSDEEP
12288:OHLXDm9aA9/SYsPz2Io1OhK/F0z7g7b5d5yBRLDU+kuuHfKZBTcylenmCqh:Q69/SxiBA4F0zsf5jyDDUMySUmCqh
Malware Config
Extracted
darkcomet
Guest16_min
127.0.0.1:4444
DCMIN_MUTEX-FQV60ZZ
-
gencode
cHPTvszRzUe5
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exedescription pid process target process PID 2228 set thread context of 2932 2228 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exedescription pid process Token: SeIncreaseQuotaPrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeSecurityPrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeSystemtimePrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeBackupPrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeRestorePrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeShutdownPrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeDebugPrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeUndockPrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeManageVolumePrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeImpersonatePrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: 33 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: 34 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe Token: 35 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exepid process 2932 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exedescription pid process target process PID 2228 wrote to memory of 2932 2228 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe PID 2228 wrote to memory of 2932 2228 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe PID 2228 wrote to memory of 2932 2228 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe PID 2228 wrote to memory of 2932 2228 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe PID 2228 wrote to memory of 2932 2228 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe PID 2228 wrote to memory of 2932 2228 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe PID 2228 wrote to memory of 2932 2228 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe PID 2228 wrote to memory of 2932 2228 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe PID 2228 wrote to memory of 2932 2228 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe PID 2228 wrote to memory of 2932 2228 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe PID 2228 wrote to memory of 2932 2228 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe PID 2228 wrote to memory of 2932 2228 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe 0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0d2b4a88fb3d1db8e590ddb6d21a5b46_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2932
-