Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
25733f053e6f0fdedbc50db5ec4d02bf_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
25733f053e6f0fdedbc50db5ec4d02bf_JaffaCakes118.exe
-
Size
748KB
-
MD5
25733f053e6f0fdedbc50db5ec4d02bf
-
SHA1
c21d094e8a130bc544b0bb64997c85bdaf30f368
-
SHA256
d647cff74210ee62da7c701ab7b090998d76df346658f83c23b40964c6687c11
-
SHA512
990b081f8279315c73f7efa8f17ee5a2359bb373c9b31d0466aaa9b337a4f7342a66c7f52a4997ab79c32aeb00a7af2532c17a31c520168f1471ecb157e272aa
-
SSDEEP
12288:ms/LbVe4RrOwnxAYMJxn7XVNBbOJB+HL3ENZ2O7RK6NPJppk:RfVe8rOXL7DzHLkdNPJppk
Malware Config
Extracted
darkcomet
FBPKR
safesys.no-ip.info:1724
DC_MUTEX-3CXAXDU
-
gencode
PupJ4ZM1s9HD
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 25733f053e6f0fdedbc50db5ec4d02bf_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation msadrh10.exe -
Executes dropped EXE 2 IoCs
pid Process 3268 msadrh10.exe 4284 lsasrv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft� Windows� Operating System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\msadrh10.exe" msadrh10.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3576 set thread context of 4460 3576 explorer.exe 90 PID 4284 set thread context of 5092 4284 lsasrv.exe 93 -
resource yara_rule behavioral2/memory/4460-12-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4460-13-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4460-14-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4460-15-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4460-16-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4460-19-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral2/memory/4460-18-0x0000000000400000-0x00000000004E8000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msadrh10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsasrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25733f053e6f0fdedbc50db5ec4d02bf_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3576 explorer.exe 3268 msadrh10.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe 3576 explorer.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3232 25733f053e6f0fdedbc50db5ec4d02bf_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeDebugPrivilege 3232 25733f053e6f0fdedbc50db5ec4d02bf_JaffaCakes118.exe Token: SeDebugPrivilege 3576 explorer.exe Token: SeIncreaseQuotaPrivilege 4460 AppLaunch.exe Token: SeSecurityPrivilege 4460 AppLaunch.exe Token: SeTakeOwnershipPrivilege 4460 AppLaunch.exe Token: SeLoadDriverPrivilege 4460 AppLaunch.exe Token: SeSystemProfilePrivilege 4460 AppLaunch.exe Token: SeSystemtimePrivilege 4460 AppLaunch.exe Token: SeProfSingleProcessPrivilege 4460 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4460 AppLaunch.exe Token: SeCreatePagefilePrivilege 4460 AppLaunch.exe Token: SeBackupPrivilege 4460 AppLaunch.exe Token: SeRestorePrivilege 4460 AppLaunch.exe Token: SeShutdownPrivilege 4460 AppLaunch.exe Token: SeDebugPrivilege 4460 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 4460 AppLaunch.exe Token: SeChangeNotifyPrivilege 4460 AppLaunch.exe Token: SeRemoteShutdownPrivilege 4460 AppLaunch.exe Token: SeUndockPrivilege 4460 AppLaunch.exe Token: SeManageVolumePrivilege 4460 AppLaunch.exe Token: SeImpersonatePrivilege 4460 AppLaunch.exe Token: SeCreateGlobalPrivilege 4460 AppLaunch.exe Token: 33 4460 AppLaunch.exe Token: 34 4460 AppLaunch.exe Token: 35 4460 AppLaunch.exe Token: 36 4460 AppLaunch.exe Token: SeDebugPrivilege 3268 msadrh10.exe Token: SeDebugPrivilege 4284 lsasrv.exe Token: SeIncreaseQuotaPrivilege 5092 AppLaunch.exe Token: SeSecurityPrivilege 5092 AppLaunch.exe Token: SeTakeOwnershipPrivilege 5092 AppLaunch.exe Token: SeLoadDriverPrivilege 5092 AppLaunch.exe Token: SeSystemProfilePrivilege 5092 AppLaunch.exe Token: SeSystemtimePrivilege 5092 AppLaunch.exe Token: SeProfSingleProcessPrivilege 5092 AppLaunch.exe Token: SeIncBasePriorityPrivilege 5092 AppLaunch.exe Token: SeCreatePagefilePrivilege 5092 AppLaunch.exe Token: SeBackupPrivilege 5092 AppLaunch.exe Token: SeRestorePrivilege 5092 AppLaunch.exe Token: SeShutdownPrivilege 5092 AppLaunch.exe Token: SeDebugPrivilege 5092 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 5092 AppLaunch.exe Token: SeChangeNotifyPrivilege 5092 AppLaunch.exe Token: SeRemoteShutdownPrivilege 5092 AppLaunch.exe Token: SeUndockPrivilege 5092 AppLaunch.exe Token: SeManageVolumePrivilege 5092 AppLaunch.exe Token: SeImpersonatePrivilege 5092 AppLaunch.exe Token: SeCreateGlobalPrivilege 5092 AppLaunch.exe Token: 33 5092 AppLaunch.exe Token: 34 5092 AppLaunch.exe Token: 35 5092 AppLaunch.exe Token: 36 5092 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4460 AppLaunch.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3232 wrote to memory of 3576 3232 25733f053e6f0fdedbc50db5ec4d02bf_JaffaCakes118.exe 86 PID 3232 wrote to memory of 3576 3232 25733f053e6f0fdedbc50db5ec4d02bf_JaffaCakes118.exe 86 PID 3232 wrote to memory of 3576 3232 25733f053e6f0fdedbc50db5ec4d02bf_JaffaCakes118.exe 86 PID 3576 wrote to memory of 4460 3576 explorer.exe 90 PID 3576 wrote to memory of 4460 3576 explorer.exe 90 PID 3576 wrote to memory of 4460 3576 explorer.exe 90 PID 3576 wrote to memory of 4460 3576 explorer.exe 90 PID 3576 wrote to memory of 4460 3576 explorer.exe 90 PID 3576 wrote to memory of 4460 3576 explorer.exe 90 PID 3576 wrote to memory of 4460 3576 explorer.exe 90 PID 3576 wrote to memory of 4460 3576 explorer.exe 90 PID 3576 wrote to memory of 3268 3576 explorer.exe 91 PID 3576 wrote to memory of 3268 3576 explorer.exe 91 PID 3576 wrote to memory of 3268 3576 explorer.exe 91 PID 3268 wrote to memory of 4284 3268 msadrh10.exe 92 PID 3268 wrote to memory of 4284 3268 msadrh10.exe 92 PID 3268 wrote to memory of 4284 3268 msadrh10.exe 92 PID 4284 wrote to memory of 5092 4284 lsasrv.exe 93 PID 4284 wrote to memory of 5092 4284 lsasrv.exe 93 PID 4284 wrote to memory of 5092 4284 lsasrv.exe 93 PID 4284 wrote to memory of 5092 4284 lsasrv.exe 93 PID 4284 wrote to memory of 5092 4284 lsasrv.exe 93 PID 4284 wrote to memory of 5092 4284 lsasrv.exe 93 PID 4284 wrote to memory of 5092 4284 lsasrv.exe 93 PID 4284 wrote to memory of 5092 4284 lsasrv.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\25733f053e6f0fdedbc50db5ec4d02bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\25733f053e6f0fdedbc50db5ec4d02bf_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4460
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\msadrh10.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\msadrh10.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\lsasrv.exe"C:\Users\Admin\AppData\Local\Temp\lsasrv.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748KB
MD525733f053e6f0fdedbc50db5ec4d02bf
SHA1c21d094e8a130bc544b0bb64997c85bdaf30f368
SHA256d647cff74210ee62da7c701ab7b090998d76df346658f83c23b40964c6687c11
SHA512990b081f8279315c73f7efa8f17ee5a2359bb373c9b31d0466aaa9b337a4f7342a66c7f52a4997ab79c32aeb00a7af2532c17a31c520168f1471ecb157e272aa
-
Filesize
6KB
MD588a7440b1ccfd4c709a5c45779e6dcbb
SHA155251f838c913fad1e9db5aa0dcb974645090623
SHA2566861da1f496cc9544c18e6e6eea1a4b34f8f173250de050eb38f2dc6ca2e3336
SHA512f0b77df5a5009543407556bbad0941a02c55789523c80ffa537a7274806bc782fb9fc258b0fae0ec0cff06e8534655f8e6909b3bba71c60e881854aa50737309