Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 04:48
Behavioral task
behavioral1
Sample
4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe
-
Size
2.7MB
-
MD5
4b7700e8694e1ef440fbd257e84113bc
-
SHA1
dfee3001eb779917cff372019824db9d212172d2
-
SHA256
ddb43783ba6210828dcbb4f0c5c37df3b757d83963659068cc5792561a0bfe97
-
SHA512
7cec22aae59fe3d224db310d0ef4ad936c733417674751aad2edbd0012dd63f76225cafdeeee847d6f47e573502a9431c379e6b221d7616007f585cabeeed486
-
SSDEEP
49152:miRnteL6cwtG5VrGdAl/z5eet7LN+e8n5yM0EXPDaPrIjhqAsqkI8UL:miWLmXAlL5eet3D8nYTcrI0cqXFL
Malware Config
Extracted
darkcomet
Zend
maikatipytkata.no-ip.biz:1604
DC_MUTEX-20515KG
-
gencode
R1G5hsj7Tl1a
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2876-0-0x0000000000400000-0x0000000000726000-memory.dmp upx behavioral2/memory/2876-4-0x0000000000400000-0x0000000000726000-memory.dmp upx behavioral2/memory/2876-5-0x0000000000400000-0x0000000000726000-memory.dmp upx behavioral2/memory/2876-6-0x0000000000400000-0x0000000000726000-memory.dmp upx behavioral2/memory/2876-7-0x0000000000400000-0x0000000000726000-memory.dmp upx behavioral2/memory/2876-8-0x0000000000400000-0x0000000000726000-memory.dmp upx behavioral2/memory/2876-9-0x0000000000400000-0x0000000000726000-memory.dmp upx behavioral2/memory/2876-10-0x0000000000400000-0x0000000000726000-memory.dmp upx behavioral2/memory/2876-11-0x0000000000400000-0x0000000000726000-memory.dmp upx behavioral2/memory/2876-12-0x0000000000400000-0x0000000000726000-memory.dmp upx behavioral2/memory/2876-13-0x0000000000400000-0x0000000000726000-memory.dmp upx behavioral2/memory/2876-14-0x0000000000400000-0x0000000000726000-memory.dmp upx behavioral2/memory/2876-15-0x0000000000400000-0x0000000000726000-memory.dmp upx behavioral2/memory/2876-16-0x0000000000400000-0x0000000000726000-memory.dmp upx behavioral2/memory/2876-17-0x0000000000400000-0x0000000000726000-memory.dmp upx behavioral2/memory/2876-18-0x0000000000400000-0x0000000000726000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeSecurityPrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeSystemtimePrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeBackupPrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeRestorePrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeShutdownPrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeDebugPrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeUndockPrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeManageVolumePrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeImpersonatePrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: 33 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: 34 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: 35 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe Token: 36 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87 PID 2876 wrote to memory of 2632 2876 4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b7700e8694e1ef440fbd257e84113bc_JaffaCakes118.exe"1⤵
- Modifies security service
- Windows security bypass
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- System Location Discovery: System Language Discovery
PID:2632
-