Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 20:23
Behavioral task
behavioral1
Sample
907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe
-
Size
3.5MB
-
MD5
907691fa850d5ed367c2c27fb5039e6c
-
SHA1
8e0772aa16a5441f8b33b414cfb2adf845f9876f
-
SHA256
0e9fb7a333bdd047f8e3e3cee9eb02296bdaf8be408071c964e4cde448005080
-
SHA512
175b34a8d6cd3c838b94c4443b5ff7dbd901ed9ccba3218348d8fc65aef3bd36bbb66befab31b7b11e2cebcd55b9a99bf35b3d60f81fee178b75df6ba6c91baf
-
SSDEEP
98304:8L1NAVmhDItiYg0xv/8owocCbWhZoUslfLu7RBKu7iwX8YtGhnZDeKNR0qD9dUI2:8L1NAVmhDItiYg0xv/8owocCbWhZoUsy
Malware Config
Signatures
-
Darkcomet family
-
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
winkey.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winkey.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winkey.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "1" winkey.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
winkey.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" winkey.exe -
Processes:
winkey.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winkey.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winkey.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
winkey.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate winkey.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
winkey.exewinkey.exepid process 3004 winkey.exe 1252 winkey.exe -
Processes:
winkey.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winkey.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winkey.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winkey = "C:\\Users\\Admin\\AppData\\Roaming\\winkey.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
winkey.exedescription pid process target process PID 3004 set thread context of 1252 3004 winkey.exe winkey.exe -
Processes:
resource yara_rule behavioral2/memory/2056-0-0x0000000000400000-0x0000000000788000-memory.dmp upx C:\Users\Admin\AppData\Roaming\winkey.txt upx behavioral2/memory/2056-29-0x0000000000400000-0x0000000000788000-memory.dmp upx behavioral2/memory/1252-31-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-34-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-35-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/3004-36-0x0000000000400000-0x0000000000788000-memory.dmp upx behavioral2/memory/1252-38-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-40-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-43-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-42-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-41-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-39-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-37-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-44-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-45-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-46-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-47-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-48-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-49-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-50-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-51-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-52-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-53-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-54-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-55-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-56-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-57-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-58-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-59-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral2/memory/1252-60-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
winkey.exewinkey.exe907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.execmd.exereg.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winkey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winkey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
winkey.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier winkey.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 winkey.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winkey.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier winkey.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
winkey.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier winkey.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
winkey.exedescription pid process Token: SeIncreaseQuotaPrivilege 1252 winkey.exe Token: SeSecurityPrivilege 1252 winkey.exe Token: SeTakeOwnershipPrivilege 1252 winkey.exe Token: SeLoadDriverPrivilege 1252 winkey.exe Token: SeSystemProfilePrivilege 1252 winkey.exe Token: SeSystemtimePrivilege 1252 winkey.exe Token: SeProfSingleProcessPrivilege 1252 winkey.exe Token: SeIncBasePriorityPrivilege 1252 winkey.exe Token: SeCreatePagefilePrivilege 1252 winkey.exe Token: SeBackupPrivilege 1252 winkey.exe Token: SeRestorePrivilege 1252 winkey.exe Token: SeShutdownPrivilege 1252 winkey.exe Token: SeDebugPrivilege 1252 winkey.exe Token: SeSystemEnvironmentPrivilege 1252 winkey.exe Token: SeChangeNotifyPrivilege 1252 winkey.exe Token: SeRemoteShutdownPrivilege 1252 winkey.exe Token: SeUndockPrivilege 1252 winkey.exe Token: SeManageVolumePrivilege 1252 winkey.exe Token: SeImpersonatePrivilege 1252 winkey.exe Token: SeCreateGlobalPrivilege 1252 winkey.exe Token: 33 1252 winkey.exe Token: 34 1252 winkey.exe Token: 35 1252 winkey.exe Token: 36 1252 winkey.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exewinkey.exewinkey.exepid process 2056 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe 3004 winkey.exe 1252 winkey.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.execmd.exewinkey.exedescription pid process target process PID 2056 wrote to memory of 2720 2056 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe cmd.exe PID 2056 wrote to memory of 2720 2056 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe cmd.exe PID 2056 wrote to memory of 2720 2056 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe cmd.exe PID 2720 wrote to memory of 3172 2720 cmd.exe reg.exe PID 2720 wrote to memory of 3172 2720 cmd.exe reg.exe PID 2720 wrote to memory of 3172 2720 cmd.exe reg.exe PID 2056 wrote to memory of 3004 2056 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe winkey.exe PID 2056 wrote to memory of 3004 2056 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe winkey.exe PID 2056 wrote to memory of 3004 2056 907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe winkey.exe PID 3004 wrote to memory of 1252 3004 winkey.exe winkey.exe PID 3004 wrote to memory of 1252 3004 winkey.exe winkey.exe PID 3004 wrote to memory of 1252 3004 winkey.exe winkey.exe PID 3004 wrote to memory of 1252 3004 winkey.exe winkey.exe PID 3004 wrote to memory of 1252 3004 winkey.exe winkey.exe PID 3004 wrote to memory of 1252 3004 winkey.exe winkey.exe PID 3004 wrote to memory of 1252 3004 winkey.exe winkey.exe PID 3004 wrote to memory of 1252 3004 winkey.exe winkey.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\907691fa850d5ed367c2c27fb5039e6c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZTore.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "winkey" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winkey.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3172
-
-
-
C:\Users\Admin\AppData\Roaming\winkey.exe"C:\Users\Admin\AppData\Roaming\winkey.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Roaming\winkey.exeC:\Users\Admin\AppData\Roaming\winkey.exe3⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Checks BIOS information in registry
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1252
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134B
MD54350c0fa19f471752ee1301f404ccc80
SHA14b0a1f0efaf35a81f04770b78a6c31be99758739
SHA25674af01f005e6d75b4266a645b8ebb4ebf70cefeb60923ec892586ea2a0ed8c3c
SHA512d03b1939463963091621b3f062178c2addbb42425354c1596192aecc8c692d2fe57a2a3636a85522dce264bee19b8125a99d9712d31eaa6d41101a709ad2efb9
-
Filesize
3.5MB
MD53c01703d18694a28e6a592e02e78edb8
SHA1dc2d55d3ffde26effef6b95168d242bb8e51b46c
SHA25600591351b2954d1c7d35a7030231de2e034fe1fbc5ec4c03238523fee4a44be5
SHA512e185ffff1bff546d0ef8ede02dfcea442b88b02beb3db78876b4aca662f2cdd6a9a486e75e607b8d06355a30aa4c810752b142f5f56e80d14b13f0e2020f1d44