Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2024, 15:11
Behavioral task
behavioral1
Sample
7a3078d2b2dbbca4258107bf1f1d9b21_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
7a3078d2b2dbbca4258107bf1f1d9b21_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
7a3078d2b2dbbca4258107bf1f1d9b21
-
SHA1
fcbf809ff0a4e4e0ce6feca34d99db7b60b5dd77
-
SHA256
c41d7f11ce201a902754dcb8107da217d3f54e3bcd9fe3feb644c6e3aed7dc10
-
SHA512
7c4622e39f8d602b01c379d08e9303c3a8ffe4745db83c90a1d80ba3b1c7a8b6ff0c9b60f0e9ea52e3c375e0cbb9ff4bc4b0c315e023429bf950c1ca766ba198
-
SSDEEP
24576:GfXOr2Z1xuVVjfFoynPaVBUR8f+kN10EBjiI8Y:GftQDgok30KiI7
Malware Config
Extracted
darkcomet
Guest16
tomhack.no-ip.org:1604
DC_MUTEX-HKTU7US
-
gencode
3cu7rNKCPLaR
-
install
false
-
offline_keylogger
true
-
password
letmein
-
persistence
false
Signatures
-
Darkcomet family
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" iexplore.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile VIR.EXE Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" VIR.EXE Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" VIR.EXE Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" iexplore.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" VIR.EXE Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" iexplore.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" VIR.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" VIR.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" iexplore.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" VIR.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" iexplore.exe -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2032 attrib.exe 5072 attrib.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7a3078d2b2dbbca4258107bf1f1d9b21_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation VIR.EXE -
Executes dropped EXE 1 IoCs
pid Process 4460 VIR.EXE -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" VIR.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" VIR.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4460 set thread context of 1532 4460 VIR.EXE 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VIR.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a3078d2b2dbbca4258107bf1f1d9b21_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1532 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4460 VIR.EXE Token: SeSecurityPrivilege 4460 VIR.EXE Token: SeTakeOwnershipPrivilege 4460 VIR.EXE Token: SeLoadDriverPrivilege 4460 VIR.EXE Token: SeSystemProfilePrivilege 4460 VIR.EXE Token: SeSystemtimePrivilege 4460 VIR.EXE Token: SeProfSingleProcessPrivilege 4460 VIR.EXE Token: SeIncBasePriorityPrivilege 4460 VIR.EXE Token: SeCreatePagefilePrivilege 4460 VIR.EXE Token: SeBackupPrivilege 4460 VIR.EXE Token: SeRestorePrivilege 4460 VIR.EXE Token: SeShutdownPrivilege 4460 VIR.EXE Token: SeDebugPrivilege 4460 VIR.EXE Token: SeSystemEnvironmentPrivilege 4460 VIR.EXE Token: SeChangeNotifyPrivilege 4460 VIR.EXE Token: SeRemoteShutdownPrivilege 4460 VIR.EXE Token: SeUndockPrivilege 4460 VIR.EXE Token: SeManageVolumePrivilege 4460 VIR.EXE Token: SeImpersonatePrivilege 4460 VIR.EXE Token: SeCreateGlobalPrivilege 4460 VIR.EXE Token: 33 4460 VIR.EXE Token: 34 4460 VIR.EXE Token: 35 4460 VIR.EXE Token: 36 4460 VIR.EXE Token: SeIncreaseQuotaPrivilege 1532 iexplore.exe Token: SeSecurityPrivilege 1532 iexplore.exe Token: SeTakeOwnershipPrivilege 1532 iexplore.exe Token: SeLoadDriverPrivilege 1532 iexplore.exe Token: SeSystemProfilePrivilege 1532 iexplore.exe Token: SeSystemtimePrivilege 1532 iexplore.exe Token: SeProfSingleProcessPrivilege 1532 iexplore.exe Token: SeIncBasePriorityPrivilege 1532 iexplore.exe Token: SeCreatePagefilePrivilege 1532 iexplore.exe Token: SeBackupPrivilege 1532 iexplore.exe Token: SeRestorePrivilege 1532 iexplore.exe Token: SeShutdownPrivilege 1532 iexplore.exe Token: SeDebugPrivilege 1532 iexplore.exe Token: SeSystemEnvironmentPrivilege 1532 iexplore.exe Token: SeChangeNotifyPrivilege 1532 iexplore.exe Token: SeRemoteShutdownPrivilege 1532 iexplore.exe Token: SeUndockPrivilege 1532 iexplore.exe Token: SeManageVolumePrivilege 1532 iexplore.exe Token: SeImpersonatePrivilege 1532 iexplore.exe Token: SeCreateGlobalPrivilege 1532 iexplore.exe Token: 33 1532 iexplore.exe Token: 34 1532 iexplore.exe Token: 35 1532 iexplore.exe Token: 36 1532 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1532 iexplore.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3376 wrote to memory of 4460 3376 7a3078d2b2dbbca4258107bf1f1d9b21_JaffaCakes118.exe 85 PID 3376 wrote to memory of 4460 3376 7a3078d2b2dbbca4258107bf1f1d9b21_JaffaCakes118.exe 85 PID 3376 wrote to memory of 4460 3376 7a3078d2b2dbbca4258107bf1f1d9b21_JaffaCakes118.exe 85 PID 4460 wrote to memory of 424 4460 VIR.EXE 87 PID 4460 wrote to memory of 424 4460 VIR.EXE 87 PID 4460 wrote to memory of 424 4460 VIR.EXE 87 PID 4460 wrote to memory of 4184 4460 VIR.EXE 89 PID 4460 wrote to memory of 4184 4460 VIR.EXE 89 PID 4460 wrote to memory of 4184 4460 VIR.EXE 89 PID 4460 wrote to memory of 1532 4460 VIR.EXE 90 PID 4460 wrote to memory of 1532 4460 VIR.EXE 90 PID 4460 wrote to memory of 1532 4460 VIR.EXE 90 PID 4460 wrote to memory of 1532 4460 VIR.EXE 90 PID 4460 wrote to memory of 1532 4460 VIR.EXE 90 PID 424 wrote to memory of 5072 424 cmd.exe 93 PID 424 wrote to memory of 5072 424 cmd.exe 93 PID 424 wrote to memory of 5072 424 cmd.exe 93 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 1532 wrote to memory of 3020 1532 iexplore.exe 92 PID 4184 wrote to memory of 2032 4184 cmd.exe 94 PID 4184 wrote to memory of 2032 4184 cmd.exe 94 PID 4184 wrote to memory of 2032 4184 cmd.exe 94 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion VIR.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern VIR.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" VIR.EXE -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 5072 attrib.exe 2032 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a3078d2b2dbbca4258107bf1f1d9b21_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7a3078d2b2dbbca4258107bf1f1d9b21_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\VIR.EXE"C:\Users\Admin\AppData\Local\Temp\VIR.EXE"2⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4460 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\VIR.EXE" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\VIR.EXE" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2032
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\notepad.exenotepad4⤵
- System Location Discovery: System Language Discovery
PID:3020
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
658KB
MD5eac458d33cbfceb1eab67f8a1b7443c8
SHA1cee408e330283f2c2c8039da252516632cc50e67
SHA256d54d3152e946fb4392eb9d6e483709af7e218e08c1f7b385e2791676109c657b
SHA512957e794e9ae313354dee273504acd646245eeacf31b41e556933e4116cfb10315a14efbd75a44a835f3e1b76834364caec74c4501996df1021fe2c626c7190ee