Analysis
-
max time kernel
150s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 20:23
Behavioral task
behavioral1
Sample
907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe
-
Size
3.5MB
-
MD5
907691fa850d5ed367c2c27fb5039e6c
-
SHA1
8e0772aa16a5441f8b33b414cfb2adf845f9876f
-
SHA256
0e9fb7a333bdd047f8e3e3cee9eb02296bdaf8be408071c964e4cde448005080
-
SHA512
175b34a8d6cd3c838b94c4443b5ff7dbd901ed9ccba3218348d8fc65aef3bd36bbb66befab31b7b11e2cebcd55b9a99bf35b3d60f81fee178b75df6ba6c91baf
-
SSDEEP
98304:8L1NAVmhDItiYg0xv/8owocCbWhZoUslfLu7RBKu7iwX8YtGhnZDeKNR0qD9dUI2:8L1NAVmhDItiYg0xv/8owocCbWhZoUsy
Malware Config
Signatures
-
Darkcomet family
-
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
winkey.exedescription ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winkey.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "1" winkey.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winkey.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
winkey.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" winkey.exe -
Processes:
winkey.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winkey.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winkey.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
winkey.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate winkey.exe -
Executes dropped EXE 2 IoCs
Processes:
winkey.exewinkey.exepid Process 2736 winkey.exe 2788 winkey.exe -
Loads dropped DLL 6 IoCs
Processes:
907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exewinkey.exepid Process 2540 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe 2540 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe 2540 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe 2540 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe 2540 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe 2736 winkey.exe -
Processes:
winkey.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winkey.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winkey.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\winkey = "C:\\Users\\Admin\\AppData\\Roaming\\winkey.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
winkey.exedescription pid Process procid_target PID 2736 set thread context of 2788 2736 winkey.exe 33 -
Processes:
resource yara_rule behavioral1/memory/2540-0-0x0000000000400000-0x0000000000788000-memory.dmp upx behavioral1/files/0x000800000001939b-27.dat upx behavioral1/memory/2540-47-0x0000000000400000-0x0000000000788000-memory.dmp upx behavioral1/memory/2788-52-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-55-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2736-56-0x0000000000400000-0x0000000000788000-memory.dmp upx behavioral1/memory/2788-57-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-59-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-63-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-62-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-61-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-60-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-58-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-64-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-65-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-66-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-67-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-68-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-69-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-70-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-71-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-72-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-73-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-74-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-75-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-76-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-77-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-78-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/memory/2788-79-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
winkey.exe907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.execmd.exereg.exewinkey.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winkey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winkey.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
winkey.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 winkey.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winkey.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier winkey.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier winkey.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
winkey.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier winkey.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
winkey.exedescription pid Process Token: SeIncreaseQuotaPrivilege 2788 winkey.exe Token: SeSecurityPrivilege 2788 winkey.exe Token: SeTakeOwnershipPrivilege 2788 winkey.exe Token: SeLoadDriverPrivilege 2788 winkey.exe Token: SeSystemProfilePrivilege 2788 winkey.exe Token: SeSystemtimePrivilege 2788 winkey.exe Token: SeProfSingleProcessPrivilege 2788 winkey.exe Token: SeIncBasePriorityPrivilege 2788 winkey.exe Token: SeCreatePagefilePrivilege 2788 winkey.exe Token: SeBackupPrivilege 2788 winkey.exe Token: SeRestorePrivilege 2788 winkey.exe Token: SeShutdownPrivilege 2788 winkey.exe Token: SeDebugPrivilege 2788 winkey.exe Token: SeSystemEnvironmentPrivilege 2788 winkey.exe Token: SeChangeNotifyPrivilege 2788 winkey.exe Token: SeRemoteShutdownPrivilege 2788 winkey.exe Token: SeUndockPrivilege 2788 winkey.exe Token: SeManageVolumePrivilege 2788 winkey.exe Token: SeImpersonatePrivilege 2788 winkey.exe Token: SeCreateGlobalPrivilege 2788 winkey.exe Token: 33 2788 winkey.exe Token: 34 2788 winkey.exe Token: 35 2788 winkey.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exewinkey.exewinkey.exepid Process 2540 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe 2736 winkey.exe 2788 winkey.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.execmd.exewinkey.exedescription pid Process procid_target PID 2540 wrote to memory of 2712 2540 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe 29 PID 2540 wrote to memory of 2712 2540 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe 29 PID 2540 wrote to memory of 2712 2540 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe 29 PID 2540 wrote to memory of 2712 2540 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe 29 PID 2712 wrote to memory of 2880 2712 cmd.exe 31 PID 2712 wrote to memory of 2880 2712 cmd.exe 31 PID 2712 wrote to memory of 2880 2712 cmd.exe 31 PID 2712 wrote to memory of 2880 2712 cmd.exe 31 PID 2540 wrote to memory of 2736 2540 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe 32 PID 2540 wrote to memory of 2736 2540 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe 32 PID 2540 wrote to memory of 2736 2540 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe 32 PID 2540 wrote to memory of 2736 2540 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe 32 PID 2736 wrote to memory of 2788 2736 winkey.exe 33 PID 2736 wrote to memory of 2788 2736 winkey.exe 33 PID 2736 wrote to memory of 2788 2736 winkey.exe 33 PID 2736 wrote to memory of 2788 2736 winkey.exe 33 PID 2736 wrote to memory of 2788 2736 winkey.exe 33 PID 2736 wrote to memory of 2788 2736 winkey.exe 33 PID 2736 wrote to memory of 2788 2736 winkey.exe 33 PID 2736 wrote to memory of 2788 2736 winkey.exe 33 PID 2736 wrote to memory of 2788 2736 winkey.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\IXSRM.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "winkey" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winkey.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
C:\Users\Admin\AppData\Roaming\winkey.exe"C:\Users\Admin\AppData\Roaming\winkey.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Roaming\winkey.exeC:\Users\Admin\AppData\Roaming\winkey.exe3⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Checks BIOS information in registry
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134B
MD54350c0fa19f471752ee1301f404ccc80
SHA14b0a1f0efaf35a81f04770b78a6c31be99758739
SHA25674af01f005e6d75b4266a645b8ebb4ebf70cefeb60923ec892586ea2a0ed8c3c
SHA512d03b1939463963091621b3f062178c2addbb42425354c1596192aecc8c692d2fe57a2a3636a85522dce264bee19b8125a99d9712d31eaa6d41101a709ad2efb9
-
Filesize
3.5MB
MD52c7d2fcebc8fc8240c9c44a3ec1a5acc
SHA1c5a0a88762bb1211d040360a7a4b01db9106d45f
SHA256517b8a8c2b5260d71cd5d6beb499d57964a7554c2d5e31d594d896fb0fe5db6b
SHA512aa0ddabaa4951445a15140cd7f164f243a3406f503d92874711c2f924d45405a01f910c3ecab9e22727dd3a938dce9b21e25dee9e158de0c1ec8f2881f267d17