Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 20:16
Static task
static1
Behavioral task
behavioral1
Sample
878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe
-
Size
262KB
-
MD5
878224ab7f5ced8b033af0afa0da61ea
-
SHA1
8e59a2d04f134cbf6b6a2d06f123c4a4b3b11211
-
SHA256
96b55b43390627ab699063ba72b06b59b1c7fece5e90e4e39c761b7df89ae63d
-
SHA512
84bade13c4c07b7bb9802d3b7e809712350b8e6ec54b87af97fa1333ad9b4af70c27a0b8327a576e9a4c36456fce211050a213a2a5445895e3d62b50f2fa54ef
-
SSDEEP
3072:vK8mzXs8UuVfh49HMoHiarmz4s4vJ/5uxXdKgwzuuqPK7zTc37Hfe+eS1mg0YWvi:C8Os04xVHhFsY5uaujK7zTEG+CgMjP
Malware Config
Extracted
darkcomet
JSB
runescape6.no-ip.org:1604
DC_MUTEX-1JFHDRH
-
gencode
oRjtH6mtKRdM
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java = "C:\\Users\\Admin\\AppData\\Local\\Temp\\878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1376 set thread context of 2760 1376 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe 87 -
resource yara_rule behavioral2/memory/2760-3-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-5-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-6-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-7-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-8-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-9-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-11-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-12-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-15-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-16-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-17-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-18-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-19-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-20-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-21-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-22-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-23-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-24-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-25-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-26-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-27-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-28-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-29-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-30-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2760-31-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1332 reg.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2760 cvtres.exe Token: SeSecurityPrivilege 2760 cvtres.exe Token: SeTakeOwnershipPrivilege 2760 cvtres.exe Token: SeLoadDriverPrivilege 2760 cvtres.exe Token: SeSystemProfilePrivilege 2760 cvtres.exe Token: SeSystemtimePrivilege 2760 cvtres.exe Token: SeProfSingleProcessPrivilege 2760 cvtres.exe Token: SeIncBasePriorityPrivilege 2760 cvtres.exe Token: SeCreatePagefilePrivilege 2760 cvtres.exe Token: SeBackupPrivilege 2760 cvtres.exe Token: SeRestorePrivilege 2760 cvtres.exe Token: SeShutdownPrivilege 2760 cvtres.exe Token: SeDebugPrivilege 2760 cvtres.exe Token: SeSystemEnvironmentPrivilege 2760 cvtres.exe Token: SeChangeNotifyPrivilege 2760 cvtres.exe Token: SeRemoteShutdownPrivilege 2760 cvtres.exe Token: SeUndockPrivilege 2760 cvtres.exe Token: SeManageVolumePrivilege 2760 cvtres.exe Token: SeImpersonatePrivilege 2760 cvtres.exe Token: SeCreateGlobalPrivilege 2760 cvtres.exe Token: 33 2760 cvtres.exe Token: 34 2760 cvtres.exe Token: 35 2760 cvtres.exe Token: 36 2760 cvtres.exe Token: SeDebugPrivilege 1376 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2760 cvtres.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1376 wrote to memory of 2760 1376 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe 87 PID 1376 wrote to memory of 2760 1376 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe 87 PID 1376 wrote to memory of 2760 1376 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe 87 PID 1376 wrote to memory of 2760 1376 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe 87 PID 1376 wrote to memory of 2760 1376 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe 87 PID 1376 wrote to memory of 2760 1376 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe 87 PID 1376 wrote to memory of 2760 1376 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe 87 PID 1376 wrote to memory of 2760 1376 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe 87 PID 1376 wrote to memory of 4128 1376 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe 88 PID 1376 wrote to memory of 4128 1376 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe 88 PID 1376 wrote to memory of 4128 1376 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe 88 PID 1376 wrote to memory of 2680 1376 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe 90 PID 1376 wrote to memory of 2680 1376 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe 90 PID 1376 wrote to memory of 2680 1376 878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe 90 PID 4128 wrote to memory of 1332 4128 cmd.exe 92 PID 4128 wrote to memory of 1332 4128 cmd.exe 92 PID 4128 wrote to memory of 1332 4128 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v Java /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v Java /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1332
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copy C:\Users\Admin\AppData\Local\Temp\878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\878224ab7f5ced8b033af0afa0da61ea_JaffaCakes118.exe /Y & exit2⤵
- System Location Discovery: System Language Discovery
PID:2680
-