Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 13:22
Static task
static1
Behavioral task
behavioral1
Sample
3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
3a3c0aa36c23d1ce82b90aa8a4826fc8
-
SHA1
0b1f693df6ff30fdeb04af20c2ec681cb3976a94
-
SHA256
b410782c26bec5ad3281f196e9ff3546be1f8394b9eadd81a7de5758286f0a36
-
SHA512
92823824ed526187d8872aab92e6cafaba8b55250b94c4b946baf75f216e363c6f0d383ac402441583580df481801696c56961714f8068c13c8643fe1419ca40
-
SSDEEP
24576:z8Evfhntxi7mrFhQ8ehkIRxgt4GZtZmWS:44txi7mr4/dRDGZLLS
Malware Config
Extracted
darkcomet
Guest16
rattingorger.zapto.org:1604
pr0h4xx.no-ip.biz:4444
DC_MUTEX-3A9SY2R
-
gencode
kZWyZl8DWoeE
-
install
false
-
offline_keylogger
true
-
persistence
false
Extracted
latentbot
rattingorger.zapto.org
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exeCertPolEng.execrypted.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation CertPolEng.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation crypted.exe -
Executes dropped EXE 4 IoCs
Processes:
crypted.exeCertPolEng.exepanmap.exeCertPolEng.exepid process 1480 crypted.exe 3564 CertPolEng.exe 4140 panmap.exe 2692 CertPolEng.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
CertPolEng.exeCertPolEng.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Certificate Policy Engine = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\CertPolEng.exe" CertPolEng.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Certificate Policy Engine = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\CertPolEng.exe" CertPolEng.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.execrypted.exepanmap.exedescription pid process target process PID 3884 set thread context of 3388 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe AppLaunch.exe PID 1480 set thread context of 4560 1480 crypted.exe AppLaunch.exe PID 4140 set thread context of 5080 4140 panmap.exe AppLaunch.exe -
Processes:
resource yara_rule behavioral2/memory/3388-28-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3388-27-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3388-25-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3388-24-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3388-23-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3388-21-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3388-22-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4560-47-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4560-48-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4560-51-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4560-50-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4560-49-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4560-52-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4560-53-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AppLaunch.exe3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.execrypted.exeAppLaunch.exeCertPolEng.exepanmap.exeAppLaunch.exeCertPolEng.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CertPolEng.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language panmap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CertPolEng.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exeCertPolEng.execrypted.exeCertPolEng.exepanmap.exepid process 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe 3564 CertPolEng.exe 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 2692 CertPolEng.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 2692 CertPolEng.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 2692 CertPolEng.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 2692 CertPolEng.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 2692 CertPolEng.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 1480 crypted.exe 4140 panmap.exe 4140 panmap.exe 1480 crypted.exe 4140 panmap.exe 1480 crypted.exe 4140 panmap.exe 2692 CertPolEng.exe 1480 crypted.exe 4140 panmap.exe 1480 crypted.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exeAppLaunch.exeCertPolEng.execrypted.exepanmap.exeAppLaunch.exeCertPolEng.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 3388 AppLaunch.exe Token: SeSecurityPrivilege 3388 AppLaunch.exe Token: SeTakeOwnershipPrivilege 3388 AppLaunch.exe Token: SeLoadDriverPrivilege 3388 AppLaunch.exe Token: SeSystemProfilePrivilege 3388 AppLaunch.exe Token: SeSystemtimePrivilege 3388 AppLaunch.exe Token: SeProfSingleProcessPrivilege 3388 AppLaunch.exe Token: SeIncBasePriorityPrivilege 3388 AppLaunch.exe Token: SeCreatePagefilePrivilege 3388 AppLaunch.exe Token: SeBackupPrivilege 3388 AppLaunch.exe Token: SeRestorePrivilege 3388 AppLaunch.exe Token: SeShutdownPrivilege 3388 AppLaunch.exe Token: SeDebugPrivilege 3388 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 3388 AppLaunch.exe Token: SeChangeNotifyPrivilege 3388 AppLaunch.exe Token: SeRemoteShutdownPrivilege 3388 AppLaunch.exe Token: SeUndockPrivilege 3388 AppLaunch.exe Token: SeManageVolumePrivilege 3388 AppLaunch.exe Token: SeImpersonatePrivilege 3388 AppLaunch.exe Token: SeCreateGlobalPrivilege 3388 AppLaunch.exe Token: 33 3388 AppLaunch.exe Token: 34 3388 AppLaunch.exe Token: 35 3388 AppLaunch.exe Token: 36 3388 AppLaunch.exe Token: SeDebugPrivilege 3564 CertPolEng.exe Token: SeDebugPrivilege 1480 crypted.exe Token: SeDebugPrivilege 4140 panmap.exe Token: SeIncreaseQuotaPrivilege 4560 AppLaunch.exe Token: SeSecurityPrivilege 4560 AppLaunch.exe Token: SeTakeOwnershipPrivilege 4560 AppLaunch.exe Token: SeLoadDriverPrivilege 4560 AppLaunch.exe Token: SeSystemProfilePrivilege 4560 AppLaunch.exe Token: SeSystemtimePrivilege 4560 AppLaunch.exe Token: SeProfSingleProcessPrivilege 4560 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4560 AppLaunch.exe Token: SeCreatePagefilePrivilege 4560 AppLaunch.exe Token: SeBackupPrivilege 4560 AppLaunch.exe Token: SeRestorePrivilege 4560 AppLaunch.exe Token: SeShutdownPrivilege 4560 AppLaunch.exe Token: SeDebugPrivilege 4560 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 4560 AppLaunch.exe Token: SeChangeNotifyPrivilege 4560 AppLaunch.exe Token: SeRemoteShutdownPrivilege 4560 AppLaunch.exe Token: SeUndockPrivilege 4560 AppLaunch.exe Token: SeManageVolumePrivilege 4560 AppLaunch.exe Token: SeImpersonatePrivilege 4560 AppLaunch.exe Token: SeCreateGlobalPrivilege 4560 AppLaunch.exe Token: 33 4560 AppLaunch.exe Token: 34 4560 AppLaunch.exe Token: 35 4560 AppLaunch.exe Token: 36 4560 AppLaunch.exe Token: SeDebugPrivilege 2692 CertPolEng.exe Token: SeIncreaseQuotaPrivilege 5080 AppLaunch.exe Token: SeSecurityPrivilege 5080 AppLaunch.exe Token: SeTakeOwnershipPrivilege 5080 AppLaunch.exe Token: SeLoadDriverPrivilege 5080 AppLaunch.exe Token: SeSystemProfilePrivilege 5080 AppLaunch.exe Token: SeSystemtimePrivilege 5080 AppLaunch.exe Token: SeProfSingleProcessPrivilege 5080 AppLaunch.exe Token: SeIncBasePriorityPrivilege 5080 AppLaunch.exe Token: SeCreatePagefilePrivilege 5080 AppLaunch.exe Token: SeBackupPrivilege 5080 AppLaunch.exe Token: SeRestorePrivilege 5080 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AppLaunch.exeAppLaunch.exepid process 3388 AppLaunch.exe 4560 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exeCertPolEng.execrypted.exepanmap.exedescription pid process target process PID 3884 wrote to memory of 1480 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe crypted.exe PID 3884 wrote to memory of 1480 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe crypted.exe PID 3884 wrote to memory of 1480 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe crypted.exe PID 3884 wrote to memory of 3388 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe AppLaunch.exe PID 3884 wrote to memory of 3388 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe AppLaunch.exe PID 3884 wrote to memory of 3388 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe AppLaunch.exe PID 3884 wrote to memory of 3388 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe AppLaunch.exe PID 3884 wrote to memory of 3388 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe AppLaunch.exe PID 3884 wrote to memory of 3388 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe AppLaunch.exe PID 3884 wrote to memory of 3388 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe AppLaunch.exe PID 3884 wrote to memory of 3388 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe AppLaunch.exe PID 3884 wrote to memory of 3564 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe CertPolEng.exe PID 3884 wrote to memory of 3564 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe CertPolEng.exe PID 3884 wrote to memory of 3564 3884 3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe CertPolEng.exe PID 3564 wrote to memory of 4140 3564 CertPolEng.exe panmap.exe PID 3564 wrote to memory of 4140 3564 CertPolEng.exe panmap.exe PID 3564 wrote to memory of 4140 3564 CertPolEng.exe panmap.exe PID 1480 wrote to memory of 4560 1480 crypted.exe AppLaunch.exe PID 1480 wrote to memory of 4560 1480 crypted.exe AppLaunch.exe PID 1480 wrote to memory of 4560 1480 crypted.exe AppLaunch.exe PID 1480 wrote to memory of 4560 1480 crypted.exe AppLaunch.exe PID 1480 wrote to memory of 4560 1480 crypted.exe AppLaunch.exe PID 1480 wrote to memory of 4560 1480 crypted.exe AppLaunch.exe PID 1480 wrote to memory of 4560 1480 crypted.exe AppLaunch.exe PID 1480 wrote to memory of 4560 1480 crypted.exe AppLaunch.exe PID 1480 wrote to memory of 2692 1480 crypted.exe CertPolEng.exe PID 1480 wrote to memory of 2692 1480 crypted.exe CertPolEng.exe PID 1480 wrote to memory of 2692 1480 crypted.exe CertPolEng.exe PID 4140 wrote to memory of 5080 4140 panmap.exe AppLaunch.exe PID 4140 wrote to memory of 5080 4140 panmap.exe AppLaunch.exe PID 4140 wrote to memory of 5080 4140 panmap.exe AppLaunch.exe PID 4140 wrote to memory of 5080 4140 panmap.exe AppLaunch.exe PID 4140 wrote to memory of 5080 4140 panmap.exe AppLaunch.exe PID 4140 wrote to memory of 5080 4140 panmap.exe AppLaunch.exe PID 4140 wrote to memory of 5080 4140 panmap.exe AppLaunch.exe PID 4140 wrote to memory of 5080 4140 panmap.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a3c0aa36c23d1ce82b90aa8a4826fc8_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\Software\crypted.exe"C:\Users\Admin\AppData\Local\Temp\Software\crypted.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4560
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CertPolEng.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CertPolEng.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3388
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CertPolEng.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CertPolEng.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\panmap.exe"C:\Users\Admin\AppData\Local\Temp\panmap.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128B
MD5a5dcc7c9c08af7dddd82be5b036a4416
SHA14f998ca1526d199e355ffb435bae111a2779b994
SHA256e24033ceec97fd03402b03acaaabd1d1e378e83bb1683afbccac760e00f8ead5
SHA51256035de734836c0c39f0b48641c51c26adb6e79c6c65e23ca96603f71c95b8673e2ef853146e87efc899dd1878d0bbc2c82d91fbf0fce81c552048e986f9bb5a
-
Filesize
442KB
MD5d5c3caf9aad5df4796058728b38d5bb1
SHA110987a9a926284ff3aaebc8665bbeb259e1f1f1a
SHA25601cebd4e4f9a1ae8d6cb0c971ae775ce3707c36bd077d175f40cd80115f271ae
SHA512c7c7c88243fda33a8b94a46734ea21facd57c580c0981b3d874b3f3c32eb7e67fb651ad08245e423724d2bca0c7f1b6faf7963afa78bf8200dccefae10674dc8
-
Filesize
1.0MB
MD53a3c0aa36c23d1ce82b90aa8a4826fc8
SHA10b1f693df6ff30fdeb04af20c2ec681cb3976a94
SHA256b410782c26bec5ad3281f196e9ff3546be1f8394b9eadd81a7de5758286f0a36
SHA51292823824ed526187d8872aab92e6cafaba8b55250b94c4b946baf75f216e363c6f0d383ac402441583580df481801696c56961714f8068c13c8643fe1419ca40
-
Filesize
7KB
MD588c4790691d323a7c67b53a14a2c9f3f
SHA1ff6553ddb5587d59fe4fbe20f847526c5baedfcc
SHA256df2463498c7da1cc942341d2fb286de4d8f53fd8b02b70810a443dba5ea0466a
SHA512b5a61b4666515bc9abde7b801a81e0e57d80a6f033a8850ad4678d2904284c78c744d2bf9340c1d6f19df046357f50307de5d92790b99aaa5df7176d20ed1e7a