Analysis
-
max time kernel
150s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 16:34
Static task
static1
Behavioral task
behavioral1
Sample
848671a2c723751f6d07a877bed1a3ce_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
848671a2c723751f6d07a877bed1a3ce_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
848671a2c723751f6d07a877bed1a3ce
-
SHA1
f1e32c4790d3f36aeb3c5eab20b1d194e21fc8ea
-
SHA256
7df4c500bbbb1f05457bb7ec67c0ce68079cf5624f2d0abd1fb03451176769c4
-
SHA512
49b234b224cbaa64fd34b7914a2c080cc51b77d121639d1dc80d0482c28bebfa185e7561326183b196c784fe3fee49d578f0459f239c6259601179e5519c8fab
-
SSDEEP
24576:vElyxYn5DlpOy2rqtIXl++F5QD5Z54uUoCsmfWQVWoNoS/pQJOhO+sA+At:vElvndO4tqTQD5dUts01uUQUCA7
Malware Config
Signatures
-
Darkcomet family
-
Executes dropped EXE 1 IoCs
Processes:
file1.exepid process 1948 file1.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
file1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
848671a2c723751f6d07a877bed1a3ce_JaffaCakes118.exedescription pid process target process PID 1836 wrote to memory of 1948 1836 848671a2c723751f6d07a877bed1a3ce_JaffaCakes118.exe file1.exe PID 1836 wrote to memory of 1948 1836 848671a2c723751f6d07a877bed1a3ce_JaffaCakes118.exe file1.exe PID 1836 wrote to memory of 1948 1836 848671a2c723751f6d07a877bed1a3ce_JaffaCakes118.exe file1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\848671a2c723751f6d07a877bed1a3ce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\848671a2c723751f6d07a877bed1a3ce_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\file1.exefile1.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
843KB
MD51d5ea6df4c1793c707edfe81767a2d24
SHA18568bb0b3b87a8e1229f00a201a3f8b13eac95ff
SHA2562353d9eba046c95a34fbd6391aded0d65c570282c28c7e01776d632590afe146
SHA5126bf2e3ab59bc2b0187a752358e049d8bfe8177c5821810978536c45d8463d8f8438c825b03c3ecda4d6aedae097a669ec22852fef984c7a5716769415dda3de4