Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 03:52
Static task
static1
Behavioral task
behavioral1
Sample
6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe
-
Size
853KB
-
MD5
6d07952bb7955a0e3843ad6682ab44fc
-
SHA1
1ee6ae4d8c17cda36cbeee34748d6fb56080ba01
-
SHA256
284a8d0f09ac22db469439e098d0bc6706bc96c7cf68ccbb5ef35534b62ff821
-
SHA512
2b4ab8fc089ab29275409fc0583a4b02808ec584ee3a19e3c302583c9870bd137eb57e71e48661e5fd9f5fda8b626e102c3b910afeff580e7eb228fc393ad7d4
-
SSDEEP
12288:1tDG20jqd59c8av2ueqYsYsyIDnX3ZUUS+A35Zg1hqizLXICiii:1tD4jkTcR2u9lLDnXuTV35O1hqCkCfi
Malware Config
Extracted
darkcomet
Guest16_min
pritt48.no-ip.biz:1604
DCMIN_MUTEX-2MNRTS6
-
gencode
jPjyKEUnTaAk
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4744 MblOffice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\death = "C:\\Users\\Admin\\AppData\\Roaming\\death.exe" WScript.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4148 set thread context of 2980 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 89 PID 4148 set thread context of 3048 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 108 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MblOffice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2980 csc.exe Token: SeSecurityPrivilege 2980 csc.exe Token: SeTakeOwnershipPrivilege 2980 csc.exe Token: SeLoadDriverPrivilege 2980 csc.exe Token: SeSystemProfilePrivilege 2980 csc.exe Token: SeSystemtimePrivilege 2980 csc.exe Token: SeProfSingleProcessPrivilege 2980 csc.exe Token: SeIncBasePriorityPrivilege 2980 csc.exe Token: SeCreatePagefilePrivilege 2980 csc.exe Token: SeBackupPrivilege 2980 csc.exe Token: SeRestorePrivilege 2980 csc.exe Token: SeShutdownPrivilege 2980 csc.exe Token: SeDebugPrivilege 2980 csc.exe Token: SeSystemEnvironmentPrivilege 2980 csc.exe Token: SeChangeNotifyPrivilege 2980 csc.exe Token: SeRemoteShutdownPrivilege 2980 csc.exe Token: SeUndockPrivilege 2980 csc.exe Token: SeManageVolumePrivilege 2980 csc.exe Token: SeImpersonatePrivilege 2980 csc.exe Token: SeCreateGlobalPrivilege 2980 csc.exe Token: 33 2980 csc.exe Token: 34 2980 csc.exe Token: 35 2980 csc.exe Token: 36 2980 csc.exe Token: SeDebugPrivilege 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 3048 csc.exe Token: SeSecurityPrivilege 3048 csc.exe Token: SeTakeOwnershipPrivilege 3048 csc.exe Token: SeLoadDriverPrivilege 3048 csc.exe Token: SeSystemProfilePrivilege 3048 csc.exe Token: SeSystemtimePrivilege 3048 csc.exe Token: SeProfSingleProcessPrivilege 3048 csc.exe Token: SeIncBasePriorityPrivilege 3048 csc.exe Token: SeCreatePagefilePrivilege 3048 csc.exe Token: SeBackupPrivilege 3048 csc.exe Token: SeRestorePrivilege 3048 csc.exe Token: SeShutdownPrivilege 3048 csc.exe Token: SeDebugPrivilege 3048 csc.exe Token: SeSystemEnvironmentPrivilege 3048 csc.exe Token: SeChangeNotifyPrivilege 3048 csc.exe Token: SeRemoteShutdownPrivilege 3048 csc.exe Token: SeUndockPrivilege 3048 csc.exe Token: SeManageVolumePrivilege 3048 csc.exe Token: SeImpersonatePrivilege 3048 csc.exe Token: SeCreateGlobalPrivilege 3048 csc.exe Token: 33 3048 csc.exe Token: 34 3048 csc.exe Token: 35 3048 csc.exe Token: 36 3048 csc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2980 csc.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 4148 wrote to memory of 4864 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 85 PID 4148 wrote to memory of 4864 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 85 PID 4148 wrote to memory of 4864 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 85 PID 4148 wrote to memory of 4204 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 87 PID 4148 wrote to memory of 4204 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 87 PID 4148 wrote to memory of 4204 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 87 PID 4148 wrote to memory of 2980 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 89 PID 4148 wrote to memory of 2980 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 89 PID 4148 wrote to memory of 2980 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 89 PID 4148 wrote to memory of 2980 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 89 PID 4148 wrote to memory of 2980 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 89 PID 4148 wrote to memory of 2980 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 89 PID 4148 wrote to memory of 2980 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 89 PID 4148 wrote to memory of 2980 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 89 PID 4148 wrote to memory of 2980 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 89 PID 4148 wrote to memory of 2980 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 89 PID 4148 wrote to memory of 2980 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 89 PID 4148 wrote to memory of 2980 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 89 PID 4148 wrote to memory of 2980 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 89 PID 4148 wrote to memory of 2980 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 89 PID 4148 wrote to memory of 4744 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 90 PID 4148 wrote to memory of 4744 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 90 PID 4148 wrote to memory of 4744 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 90 PID 4148 wrote to memory of 3048 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 108 PID 4148 wrote to memory of 3048 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 108 PID 4148 wrote to memory of 3048 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 108 PID 4148 wrote to memory of 3048 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 108 PID 4148 wrote to memory of 3048 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 108 PID 4148 wrote to memory of 3048 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 108 PID 4148 wrote to memory of 3048 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 108 PID 4148 wrote to memory of 3048 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 108 PID 4148 wrote to memory of 3048 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 108 PID 4148 wrote to memory of 3048 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 108 PID 4148 wrote to memory of 3048 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 108 PID 4148 wrote to memory of 3048 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 108 PID 4148 wrote to memory of 3048 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 108 PID 4148 wrote to memory of 3048 4148 6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6d07952bb7955a0e3843ad6682ab44fc_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C cd C:\Users\Admin\AppData\Roaming\ &&ren *.zgy *.exe && exit2⤵
- System Location Discovery: System Language Discovery
PID:4864
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\MTemp104.vbs"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4204
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\MblOffice.exeC:\Users\Admin\AppData\Local\Temp\MblOffice.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4744
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433B
MD5e2a3c3faa1ca81e0e5c52a4ff2ddca30
SHA1036bf5d24b5262413a5e41744719e65bcb08c06f
SHA256f4616fd7dc052972d2290c56a6a657188cf2d148bb767731fcd3ae758d1ff716
SHA512c01f36a17acd93b74263ae5bf7b7bc73f1fefc42387e5507e13d42a7f258968d0e607c6f6291d953f4aa25e88209e27be7943b528fb69388297339d5224bf1af
-
Filesize
853KB
MD56d07952bb7955a0e3843ad6682ab44fc
SHA11ee6ae4d8c17cda36cbeee34748d6fb56080ba01
SHA256284a8d0f09ac22db469439e098d0bc6706bc96c7cf68ccbb5ef35534b62ff821
SHA5122b4ab8fc089ab29275409fc0583a4b02808ec584ee3a19e3c302583c9870bd137eb57e71e48661e5fd9f5fda8b626e102c3b910afeff580e7eb228fc393ad7d4