Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 00:43
Behavioral task
behavioral1
Sample
6c850638e6710308a0423b5053079770_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
6c850638e6710308a0423b5053079770_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
6c850638e6710308a0423b5053079770
-
SHA1
ceba9d5c2eaf48f6c0fd85dff4a1ea6e67ce6e12
-
SHA256
c8fdafdd08e55eba2df997c7d8da4d4092819522b79228157eccaaced13fdca5
-
SHA512
f8c849c5fa87e12d97ec4b6a00ac951efc8b6fe67173b1010d31e22a79e9a79525a3813c82599126b8b90018c7d3b66981b7c0f22af9216f54604fdf2853141c
-
SSDEEP
24576:Q0QRWoJEfg0oChGdJQbjPbNW5tYeP+GF980iVOq2gI9KuwnlHoMUVmzOZBDf5pPQ:LQRV2o3MPY5Ar/G07lHg/qMvWWOZRb
Malware Config
Extracted
darkcomet
Guest16
harem.zapto.org:1604
DC_MUTEX-1LAL7PT
-
gencode
at5ugyKVDMMh
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" iexplore.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" iexplore.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4900 attrib.exe 1928 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 6c850638e6710308a0423b5053079770_JaffaCakes118.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6c850638e6710308a0423b5053079770_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2264 set thread context of 2020 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeSecurityPrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeSystemtimePrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeBackupPrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeRestorePrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeShutdownPrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeDebugPrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeUndockPrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeManageVolumePrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeImpersonatePrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: 33 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: 34 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: 35 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: 36 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2020 iexplore.exe Token: SeSecurityPrivilege 2020 iexplore.exe Token: SeTakeOwnershipPrivilege 2020 iexplore.exe Token: SeLoadDriverPrivilege 2020 iexplore.exe Token: SeSystemProfilePrivilege 2020 iexplore.exe Token: SeSystemtimePrivilege 2020 iexplore.exe Token: SeProfSingleProcessPrivilege 2020 iexplore.exe Token: SeIncBasePriorityPrivilege 2020 iexplore.exe Token: SeCreatePagefilePrivilege 2020 iexplore.exe Token: SeBackupPrivilege 2020 iexplore.exe Token: SeRestorePrivilege 2020 iexplore.exe Token: SeShutdownPrivilege 2020 iexplore.exe Token: SeDebugPrivilege 2020 iexplore.exe Token: SeSystemEnvironmentPrivilege 2020 iexplore.exe Token: SeChangeNotifyPrivilege 2020 iexplore.exe Token: SeRemoteShutdownPrivilege 2020 iexplore.exe Token: SeUndockPrivilege 2020 iexplore.exe Token: SeManageVolumePrivilege 2020 iexplore.exe Token: SeImpersonatePrivilege 2020 iexplore.exe Token: SeCreateGlobalPrivilege 2020 iexplore.exe Token: 33 2020 iexplore.exe Token: 34 2020 iexplore.exe Token: 35 2020 iexplore.exe Token: 36 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2264 wrote to memory of 3744 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe 84 PID 2264 wrote to memory of 3744 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe 84 PID 2264 wrote to memory of 3744 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe 84 PID 2264 wrote to memory of 1916 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe 85 PID 2264 wrote to memory of 1916 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe 85 PID 2264 wrote to memory of 1916 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe 85 PID 2264 wrote to memory of 2020 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe 87 PID 2264 wrote to memory of 2020 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe 87 PID 2264 wrote to memory of 2020 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe 87 PID 2264 wrote to memory of 2020 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe 87 PID 2264 wrote to memory of 2020 2264 6c850638e6710308a0423b5053079770_JaffaCakes118.exe 87 PID 3744 wrote to memory of 4900 3744 cmd.exe 89 PID 3744 wrote to memory of 4900 3744 cmd.exe 89 PID 3744 wrote to memory of 4900 3744 cmd.exe 89 PID 1916 wrote to memory of 1928 1916 cmd.exe 90 PID 1916 wrote to memory of 1928 1916 cmd.exe 90 PID 1916 wrote to memory of 1928 1916 cmd.exe 90 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4900 attrib.exe 1928 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c850638e6710308a0423b5053079770_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6c850638e6710308a0423b5053079770_JaffaCakes118.exe"1⤵
- Windows security bypass
- Disables RegEdit via registry modification
- Checks computer location settings
- Windows security modification
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\6c850638e6710308a0423b5053079770_JaffaCakes118.exe" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\6c850638e6710308a0423b5053079770_JaffaCakes118.exe" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4900
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1928
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵
- Windows security bypass
- Disables RegEdit via registry modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2020
-