Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 09:28
Behavioral task
behavioral1
Sample
56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe
-
Size
660KB
-
MD5
56aaa4671f57bd402137d0f6c1af513f
-
SHA1
1ba79eeb3b34b6256e949b7013e880ddfa2f897a
-
SHA256
305a3aa1f047b52667a2a5eaeca9e7bd0d645d5826bf815dfa93a674d9075662
-
SHA512
34a20134353f44763552af8cdd11c631272b81a1c4aad3818e69c00cac71219c044de8459efc0bd7bd1868aab5696acae0e47b0c6125f1eec707507b23f22a59
-
SSDEEP
12288:QXhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy452U6:2nAw2WWeFcfbP9VPSPMTSPL/rWvzq4JK
Malware Config
Extracted
darkcomet
DarkComet
galaxythunder.no-ip.biz:1604
DC_MUTEX-8VNT3S3
-
gencode
DxGVeKVEsiJK
-
install
false
-
offline_keylogger
true
-
password
abc123
-
persistence
false
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid Process 2816 attrib.exe 2812 attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exenotepad.execmd.execmd.exeattrib.exeattrib.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exepid Process 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exedescription pid Process Token: SeIncreaseQuotaPrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeSecurityPrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeSystemtimePrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeBackupPrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeRestorePrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeShutdownPrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeDebugPrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeUndockPrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeManageVolumePrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeImpersonatePrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: 33 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: 34 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe Token: 35 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exepid Process 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.execmd.execmd.exedescription pid Process procid_target PID 2520 wrote to memory of 1984 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 30 PID 2520 wrote to memory of 1984 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 30 PID 2520 wrote to memory of 1984 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 30 PID 2520 wrote to memory of 1984 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2016 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2016 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2016 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2016 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2520 wrote to memory of 2360 2520 56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe 33 PID 2016 wrote to memory of 2812 2016 cmd.exe 35 PID 2016 wrote to memory of 2812 2016 cmd.exe 35 PID 2016 wrote to memory of 2812 2016 cmd.exe 35 PID 2016 wrote to memory of 2812 2016 cmd.exe 35 PID 1984 wrote to memory of 2816 1984 cmd.exe 36 PID 1984 wrote to memory of 2816 1984 cmd.exe 36 PID 1984 wrote to memory of 2816 1984 cmd.exe 36 PID 1984 wrote to memory of 2816 1984 cmd.exe 36 -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid Process 2812 attrib.exe 2816 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\56aaa4671f57bd402137d0f6c1af513f_JaffaCakes118.exe" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2816
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2812
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- System Location Discovery: System Language Discovery
PID:2360
-