Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/10/2024, 10:50
Behavioral task
behavioral1
Sample
1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe
-
Size
658KB
-
MD5
1d07e763334e037de27880e3fbd8d6d5
-
SHA1
44766450e2f83dea0ab69e81350ad9588ed79918
-
SHA256
cc1784d8f2fea6c68a03fc1ad52c8ebdd4516fbb231911be31160eac06245d1f
-
SHA512
58e8957982c8ee08662068d193e2c6615ec79facf37e243963fe0fa967aef400c9222b5b28a06339ec68fd07a780b46899677c98dc5a03cd0b5435e7a7a50793
-
SSDEEP
12288:i9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hl:OZ1xuVVjfFoynPaVBUR8f+kN10EBv
Malware Config
Extracted
darkcomet
Guest16
77.0.82.214:1604
DC_MUTEX-ZMR6BJ1
-
gencode
jip5BD5JUR5T
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeSecurityPrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeSystemtimePrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeBackupPrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeRestorePrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeShutdownPrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeDebugPrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeUndockPrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeManageVolumePrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeImpersonatePrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: 33 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: 34 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe Token: 35 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2380 1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1d07e763334e037de27880e3fbd8d6d5_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2380