Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 00:25
Static task
static1
Behavioral task
behavioral1
Sample
7d4215b25a3d8881a18641d83873ac96_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7d4215b25a3d8881a18641d83873ac96_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
7d4215b25a3d8881a18641d83873ac96_JaffaCakes118.exe
-
Size
849KB
-
MD5
7d4215b25a3d8881a18641d83873ac96
-
SHA1
79293a0badf34dc14380c70181d61aa11a53ac33
-
SHA256
69460fd08183865d32f5f319299449ffcadd08e6759b5aa1a9bc9a0a2e77a97a
-
SHA512
40358d530a621bdf44ddaeced4071312325aa91ead3847f41cb4ea40783c75927a0e09ff6be932a6945320eb92bae73346cdc0030aefa39df5a991573e00b7a4
-
SSDEEP
24576:VGjjUxDpIUDdNIFPy4AKVJp0vC2SXwTDxNT:VGjAdpIUxaVykfp0vC2SXIDxNT
Malware Config
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\System\\ÚÈÏÇáÑÍãä.exe" ciara.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate ciara.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate ÚÈÏÇáÑÍãä.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7d4215b25a3d8881a18641d83873ac96_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ciara.exe -
Executes dropped EXE 2 IoCs
pid Process 4556 ciara.exe 2208 ÚÈÏÇáÑÍãä.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\System\\ÚÈÏÇáÑÍãä.exe" ciara.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ciara.exe 7d4215b25a3d8881a18641d83873ac96_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d4215b25a3d8881a18641d83873ac96_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ciara.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÚÈÏÇáÑÍãä.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier ciara.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier ciara.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ÚÈÏÇáÑÍãä.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ÚÈÏÇáÑÍãä.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier ÚÈÏÇáÑÍãä.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier ÚÈÏÇáÑÍãä.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ciara.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ciara.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier ciara.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier ÚÈÏÇáÑÍãä.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4556 ciara.exe Token: SeSecurityPrivilege 4556 ciara.exe Token: SeTakeOwnershipPrivilege 4556 ciara.exe Token: SeLoadDriverPrivilege 4556 ciara.exe Token: SeSystemProfilePrivilege 4556 ciara.exe Token: SeSystemtimePrivilege 4556 ciara.exe Token: SeProfSingleProcessPrivilege 4556 ciara.exe Token: SeIncBasePriorityPrivilege 4556 ciara.exe Token: SeCreatePagefilePrivilege 4556 ciara.exe Token: SeBackupPrivilege 4556 ciara.exe Token: SeRestorePrivilege 4556 ciara.exe Token: SeShutdownPrivilege 4556 ciara.exe Token: SeDebugPrivilege 4556 ciara.exe Token: SeSystemEnvironmentPrivilege 4556 ciara.exe Token: SeChangeNotifyPrivilege 4556 ciara.exe Token: SeRemoteShutdownPrivilege 4556 ciara.exe Token: SeUndockPrivilege 4556 ciara.exe Token: SeManageVolumePrivilege 4556 ciara.exe Token: SeImpersonatePrivilege 4556 ciara.exe Token: SeCreateGlobalPrivilege 4556 ciara.exe Token: 33 4556 ciara.exe Token: 34 4556 ciara.exe Token: 35 4556 ciara.exe Token: 36 4556 ciara.exe Token: SeIncreaseQuotaPrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeSecurityPrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeTakeOwnershipPrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeLoadDriverPrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeSystemProfilePrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeSystemtimePrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeProfSingleProcessPrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeIncBasePriorityPrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeCreatePagefilePrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeBackupPrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeRestorePrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeShutdownPrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeDebugPrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeSystemEnvironmentPrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeChangeNotifyPrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeRemoteShutdownPrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeUndockPrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeManageVolumePrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeImpersonatePrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: SeCreateGlobalPrivilege 2208 ÚÈÏÇáÑÍãä.exe Token: 33 2208 ÚÈÏÇáÑÍãä.exe Token: 34 2208 ÚÈÏÇáÑÍãä.exe Token: 35 2208 ÚÈÏÇáÑÍãä.exe Token: 36 2208 ÚÈÏÇáÑÍãä.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2576 wrote to memory of 4556 2576 7d4215b25a3d8881a18641d83873ac96_JaffaCakes118.exe 84 PID 2576 wrote to memory of 4556 2576 7d4215b25a3d8881a18641d83873ac96_JaffaCakes118.exe 84 PID 2576 wrote to memory of 4556 2576 7d4215b25a3d8881a18641d83873ac96_JaffaCakes118.exe 84 PID 4556 wrote to memory of 2208 4556 ciara.exe 86 PID 4556 wrote to memory of 2208 4556 ciara.exe 86 PID 4556 wrote to memory of 2208 4556 ciara.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d4215b25a3d8881a18641d83873ac96_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7d4215b25a3d8881a18641d83873ac96_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\ciara.exe"C:\Windows\System32\ciara.exe"2⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\System\ÚÈÏÇáÑÍãä.exe"C:\System\ÚÈÏÇáÑÍãä.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
713KB
MD5226167943df3c9945a486fe8633dca89
SHA16b5ff809ca57fc3f01001d92749071c6a3a76aa0
SHA2564dc458e8d9f7d5a9c7c327f98758f1b1887b03f7fab8de276f28ed31182596d1
SHA512ace422d779cbc5c0969528bdbcb77ed445d9aa10eac6a25b905b74f45c933b640b9a7dfbfd49a913c80fe060b7ef21917eafedaf8846f57601a7b14b7037f07f