Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe
-
Size
421KB
-
MD5
40b4d53e52d6ac2f37aa6540b9258b9d
-
SHA1
87415fc56d8d87ea631f5161f6584e3e3d338fd1
-
SHA256
2a8dca5794c095ea67845468a3fd0a8e91a24bf3f0bb5e0ec6c16a6579cc4e90
-
SHA512
05f5c90c3ea91d4e42accf91ff0a3367f1984bfdcaee43f9288d08f5a749e373161212c580096830231f570bba6220ab060b199a218ca6f90d30195600efa33f
-
SSDEEP
6144:m9kzClPoAZwmO1wiK8Om6laacRNNFSGpvK2wh1MQGVlC+MBQTnjlUWRlYwLnjECV:kkzClwT6a7tSGpv/wh1NaQ0jlUAtjJ
Malware Config
Extracted
darkcomet
Work
microsoft-live.servegame.com:7
microsoft-live.servegame.com:777
DC_MUTEX-2RAXGRK
-
gencode
hdpDZykSFqu1
-
install
false
-
offline_keylogger
true
-
password
123@nine
-
persistence
false
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2832 diager.exe 2564 vfnws.exe -
Loads dropped DLL 4 IoCs
pid Process 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2832 diager.exe 2832 diager.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\diager.exe" diager.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2232 set thread context of 2812 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 30 PID 2564 set thread context of 2628 2564 vfnws.exe 33 -
resource yara_rule behavioral1/memory/2812-13-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2812-9-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2812-15-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2812-14-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2812-10-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2812-25-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2812-28-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2812-27-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2812-31-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2812-30-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2812-29-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2628-48-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2628-47-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfnws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language diager.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2832 diager.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2564 vfnws.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2832 diager.exe 2564 vfnws.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2832 diager.exe 2564 vfnws.exe 2832 diager.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2564 vfnws.exe 2832 diager.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2564 vfnws.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2832 diager.exe 2564 vfnws.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2832 diager.exe 2564 vfnws.exe 2832 diager.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2564 vfnws.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2832 diager.exe 2564 vfnws.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2832 diager.exe 2564 vfnws.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2832 diager.exe 2564 vfnws.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2832 diager.exe 2564 vfnws.exe 2832 diager.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2564 vfnws.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2832 diager.exe 2564 vfnws.exe 2832 diager.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2564 vfnws.exe 2832 diager.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2564 vfnws.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2832 diager.exe 2564 vfnws.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2832 diager.exe 2564 vfnws.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2832 diager.exe 2564 vfnws.exe 2832 diager.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 2564 vfnws.exe 2832 diager.exe 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2812 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe Token: SeDebugPrivilege 2832 diager.exe Token: SeIncreaseQuotaPrivilege 2812 AppLaunch.exe Token: SeSecurityPrivilege 2812 AppLaunch.exe Token: SeTakeOwnershipPrivilege 2812 AppLaunch.exe Token: SeLoadDriverPrivilege 2812 AppLaunch.exe Token: SeSystemProfilePrivilege 2812 AppLaunch.exe Token: SeSystemtimePrivilege 2812 AppLaunch.exe Token: SeProfSingleProcessPrivilege 2812 AppLaunch.exe Token: SeIncBasePriorityPrivilege 2812 AppLaunch.exe Token: SeCreatePagefilePrivilege 2812 AppLaunch.exe Token: SeBackupPrivilege 2812 AppLaunch.exe Token: SeRestorePrivilege 2812 AppLaunch.exe Token: SeShutdownPrivilege 2812 AppLaunch.exe Token: SeDebugPrivilege 2812 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 2812 AppLaunch.exe Token: SeChangeNotifyPrivilege 2812 AppLaunch.exe Token: SeRemoteShutdownPrivilege 2812 AppLaunch.exe Token: SeUndockPrivilege 2812 AppLaunch.exe Token: SeManageVolumePrivilege 2812 AppLaunch.exe Token: SeImpersonatePrivilege 2812 AppLaunch.exe Token: SeCreateGlobalPrivilege 2812 AppLaunch.exe Token: 33 2812 AppLaunch.exe Token: 34 2812 AppLaunch.exe Token: 35 2812 AppLaunch.exe Token: SeDebugPrivilege 2564 vfnws.exe Token: SeIncreaseQuotaPrivilege 2628 AppLaunch.exe Token: SeSecurityPrivilege 2628 AppLaunch.exe Token: SeTakeOwnershipPrivilege 2628 AppLaunch.exe Token: SeLoadDriverPrivilege 2628 AppLaunch.exe Token: SeSystemProfilePrivilege 2628 AppLaunch.exe Token: SeSystemtimePrivilege 2628 AppLaunch.exe Token: SeProfSingleProcessPrivilege 2628 AppLaunch.exe Token: SeIncBasePriorityPrivilege 2628 AppLaunch.exe Token: SeCreatePagefilePrivilege 2628 AppLaunch.exe Token: SeBackupPrivilege 2628 AppLaunch.exe Token: SeRestorePrivilege 2628 AppLaunch.exe Token: SeShutdownPrivilege 2628 AppLaunch.exe Token: SeDebugPrivilege 2628 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 2628 AppLaunch.exe Token: SeChangeNotifyPrivilege 2628 AppLaunch.exe Token: SeRemoteShutdownPrivilege 2628 AppLaunch.exe Token: SeUndockPrivilege 2628 AppLaunch.exe Token: SeManageVolumePrivilege 2628 AppLaunch.exe Token: SeImpersonatePrivilege 2628 AppLaunch.exe Token: SeCreateGlobalPrivilege 2628 AppLaunch.exe Token: 33 2628 AppLaunch.exe Token: 34 2628 AppLaunch.exe Token: 35 2628 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2812 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2812 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2812 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2812 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2812 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2812 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2812 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2812 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2812 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2812 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2812 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2812 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 30 PID 2232 wrote to memory of 2832 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2832 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2832 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2832 2232 40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe 31 PID 2832 wrote to memory of 2564 2832 diager.exe 32 PID 2832 wrote to memory of 2564 2832 diager.exe 32 PID 2832 wrote to memory of 2564 2832 diager.exe 32 PID 2832 wrote to memory of 2564 2832 diager.exe 32 PID 2564 wrote to memory of 2628 2564 vfnws.exe 33 PID 2564 wrote to memory of 2628 2564 vfnws.exe 33 PID 2564 wrote to memory of 2628 2564 vfnws.exe 33 PID 2564 wrote to memory of 2628 2564 vfnws.exe 33 PID 2564 wrote to memory of 2628 2564 vfnws.exe 33 PID 2564 wrote to memory of 2628 2564 vfnws.exe 33 PID 2564 wrote to memory of 2628 2564 vfnws.exe 33 PID 2564 wrote to memory of 2628 2564 vfnws.exe 33 PID 2564 wrote to memory of 2628 2564 vfnws.exe 33 PID 2564 wrote to memory of 2628 2564 vfnws.exe 33 PID 2564 wrote to memory of 2628 2564 vfnws.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\40b4d53e52d6ac2f37aa6540b9258b9d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2812
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\diager.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\diager.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\vfnws.exe"C:\Users\Admin\AppData\Local\Temp\vfnws.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5ef4e862d27e079fbbd99c60dd0880447
SHA1dd87d70bb10098110c20a128952596b5e91272f3
SHA256b42ec18f36f7b06ba7348d7de3fa5c92613073ec3aa5a76fd8a3fe01d964a9df
SHA5120d0a2656dc4172bbebcc58f8c3c61bc7a7920cb7c155f45fc1dc783d345391cad0ab4282d05d56687737cc13d8298253a4552f76346b247f377cf02af8c857d8
-
Filesize
421KB
MD540b4d53e52d6ac2f37aa6540b9258b9d
SHA187415fc56d8d87ea631f5161f6584e3e3d338fd1
SHA2562a8dca5794c095ea67845468a3fd0a8e91a24bf3f0bb5e0ec6c16a6579cc4e90
SHA51205f5c90c3ea91d4e42accf91ff0a3367f1984bfdcaee43f9288d08f5a749e373161212c580096830231f570bba6220ab060b199a218ca6f90d30195600efa33f