Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe
-
Size
545KB
-
MD5
7fd577b2e9308b3603e29c0da895b85e
-
SHA1
4a6ec3c10b941acba927d632c9a783d4b31a1c79
-
SHA256
b8d6dc53219a722528a452af019c2f2d970f00bdc4046a75be84248efa20bdb1
-
SHA512
be21b55202f8ad777a63832d2d594cba96cb42f335af92789b4804d4879b3e857186b19584c543859272a558f73db6459d50d16ff477867247843f8a7da6ab9b
-
SSDEEP
12288:ItPlkzVLXnY38LrgmOKwvcerqzqtF3RW9+fz:4YrgmfVGtF3Cm
Malware Config
Extracted
darkcomet
Guest16
pleasuredroid.no-ip.org:4444
DC_MUTEX-X15LY6S
-
gencode
Kn3aYhVAvmqb
-
install
false
-
offline_keylogger
true
-
password
nfl2378
-
persistence
false
Signatures
-
Darkcomet family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation msadrh10.exe -
Executes dropped EXE 2 IoCs
pid Process 1328 msadrh10.exe 4856 lsasrv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\msadrh10.exe" msadrh10.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4084 set thread context of 2476 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 103 PID 4856 set thread context of 4272 4856 lsasrv.exe 110 -
resource yara_rule behavioral2/memory/2476-9-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2476-10-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2476-11-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2476-13-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2476-12-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2476-15-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2476-16-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsasrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 1328 msadrh10.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2476 AppLaunch.exe Token: SeSecurityPrivilege 2476 AppLaunch.exe Token: SeTakeOwnershipPrivilege 2476 AppLaunch.exe Token: SeLoadDriverPrivilege 2476 AppLaunch.exe Token: SeSystemProfilePrivilege 2476 AppLaunch.exe Token: SeSystemtimePrivilege 2476 AppLaunch.exe Token: SeProfSingleProcessPrivilege 2476 AppLaunch.exe Token: SeIncBasePriorityPrivilege 2476 AppLaunch.exe Token: SeCreatePagefilePrivilege 2476 AppLaunch.exe Token: SeBackupPrivilege 2476 AppLaunch.exe Token: SeRestorePrivilege 2476 AppLaunch.exe Token: SeShutdownPrivilege 2476 AppLaunch.exe Token: SeDebugPrivilege 2476 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 2476 AppLaunch.exe Token: SeChangeNotifyPrivilege 2476 AppLaunch.exe Token: SeRemoteShutdownPrivilege 2476 AppLaunch.exe Token: SeUndockPrivilege 2476 AppLaunch.exe Token: SeManageVolumePrivilege 2476 AppLaunch.exe Token: SeImpersonatePrivilege 2476 AppLaunch.exe Token: SeCreateGlobalPrivilege 2476 AppLaunch.exe Token: 33 2476 AppLaunch.exe Token: 34 2476 AppLaunch.exe Token: 35 2476 AppLaunch.exe Token: 36 2476 AppLaunch.exe Token: SeDebugPrivilege 1328 msadrh10.exe Token: SeDebugPrivilege 4856 lsasrv.exe Token: SeIncreaseQuotaPrivilege 4272 AppLaunch.exe Token: SeSecurityPrivilege 4272 AppLaunch.exe Token: SeTakeOwnershipPrivilege 4272 AppLaunch.exe Token: SeLoadDriverPrivilege 4272 AppLaunch.exe Token: SeSystemProfilePrivilege 4272 AppLaunch.exe Token: SeSystemtimePrivilege 4272 AppLaunch.exe Token: SeProfSingleProcessPrivilege 4272 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4272 AppLaunch.exe Token: SeCreatePagefilePrivilege 4272 AppLaunch.exe Token: SeBackupPrivilege 4272 AppLaunch.exe Token: SeRestorePrivilege 4272 AppLaunch.exe Token: SeShutdownPrivilege 4272 AppLaunch.exe Token: SeDebugPrivilege 4272 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 4272 AppLaunch.exe Token: SeChangeNotifyPrivilege 4272 AppLaunch.exe Token: SeRemoteShutdownPrivilege 4272 AppLaunch.exe Token: SeUndockPrivilege 4272 AppLaunch.exe Token: SeManageVolumePrivilege 4272 AppLaunch.exe Token: SeImpersonatePrivilege 4272 AppLaunch.exe Token: SeCreateGlobalPrivilege 4272 AppLaunch.exe Token: 33 4272 AppLaunch.exe Token: 34 4272 AppLaunch.exe Token: 35 4272 AppLaunch.exe Token: 36 4272 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2476 AppLaunch.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4084 wrote to memory of 2476 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 103 PID 4084 wrote to memory of 2476 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 103 PID 4084 wrote to memory of 2476 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 103 PID 4084 wrote to memory of 2476 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 103 PID 4084 wrote to memory of 2476 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 103 PID 4084 wrote to memory of 2476 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 103 PID 4084 wrote to memory of 2476 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 103 PID 4084 wrote to memory of 2476 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 103 PID 4084 wrote to memory of 1328 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 104 PID 4084 wrote to memory of 1328 4084 7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe 104 PID 1328 wrote to memory of 4856 1328 msadrh10.exe 106 PID 1328 wrote to memory of 4856 1328 msadrh10.exe 106 PID 1328 wrote to memory of 4856 1328 msadrh10.exe 106 PID 4856 wrote to memory of 4272 4856 lsasrv.exe 110 PID 4856 wrote to memory of 4272 4856 lsasrv.exe 110 PID 4856 wrote to memory of 4272 4856 lsasrv.exe 110 PID 4856 wrote to memory of 4272 4856 lsasrv.exe 110 PID 4856 wrote to memory of 4272 4856 lsasrv.exe 110 PID 4856 wrote to memory of 4272 4856 lsasrv.exe 110 PID 4856 wrote to memory of 4272 4856 lsasrv.exe 110 PID 4856 wrote to memory of 4272 4856 lsasrv.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7fd577b2e9308b3603e29c0da895b85e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2476
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\msadrh10.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\msadrh10.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\lsasrv.exe"C:\Users\Admin\AppData\Local\Temp\lsasrv.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
545KB
MD57fd577b2e9308b3603e29c0da895b85e
SHA14a6ec3c10b941acba927d632c9a783d4b31a1c79
SHA256b8d6dc53219a722528a452af019c2f2d970f00bdc4046a75be84248efa20bdb1
SHA512be21b55202f8ad777a63832d2d594cba96cb42f335af92789b4804d4879b3e857186b19584c543859272a558f73db6459d50d16ff477867247843f8a7da6ab9b
-
Filesize
7KB
MD5583c2519171b4818732c7a605bee30e6
SHA1361056c9c4513d35a865538db3c147ff9000e0d7
SHA256d2f78c23be8ba6af4a1fadd9c04ef20700f97779bf9aacf23b8bcdc5303d4e0c
SHA512070210681607b493d8279aafec1fd912e6aeb38e17c2667fb5a7a7e6664808ce3b97b210ab6c53d03f7af29743dfaadcfa9222ae0b00b3258f98383c254c7857