Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 02:27
Behavioral task
behavioral1
Sample
920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe
-
Size
805KB
-
MD5
920a6ee052bcfaf17abf6977431a6bd8
-
SHA1
77541716906dc4be85ac39ea2dfced1a9ef57861
-
SHA256
b088833e8dddce0b2f6d61ddefcfdc7e19941a46a8726df5efa90809cdc8f68d
-
SHA512
871b134ed9d639409fc62e7f9a18ae25e673b528bf88b2e45b3931584b00c0b05f444ccb8467c6c34093b058b72833b0d1739d7bb1b6573ce25fb75c275a8f2d
-
SSDEEP
12288:UIRDYapjqxhDjaAchpWsuVtDnBsBDJIcynnC90levX4CuYf2D82T3s99+VHuNKO2:U0qrmAEE3uBDhynCylQgi63O9+VuNI
Malware Config
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windupdt\\winupdate.exe" 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
winupdate.exedescription ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winupdate.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "1" winupdate.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winupdate.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
winupdate.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" winupdate.exe -
Processes:
winupdate.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winupdate.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exewinupdate.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate winupdate.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2196 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
winupdate.exewinupdate.exepid Process 2268 winupdate.exe 2928 winupdate.exe -
Loads dropped DLL 8 IoCs
Processes:
920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exewinupdate.exewinupdate.exepid Process 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 2268 winupdate.exe 2268 winupdate.exe 2268 winupdate.exe 2268 winupdate.exe 2928 winupdate.exe 2928 winupdate.exe 2928 winupdate.exe -
Processes:
winupdate.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winupdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exewinupdate.exedescription pid Process procid_target PID 2032 set thread context of 2124 2032 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 30 PID 2268 set thread context of 2928 2268 winupdate.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exewinupdate.exewinupdate.execmd.exePING.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exewinupdate.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier winupdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exewinupdate.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier winupdate.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
winupdate.exepid Process 2928 winupdate.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exewinupdate.exedescription pid Process Token: SeIncreaseQuotaPrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeSecurityPrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeSystemtimePrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeBackupPrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeRestorePrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeShutdownPrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeDebugPrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeUndockPrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeManageVolumePrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeImpersonatePrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: 33 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: 34 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: 35 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2928 winupdate.exe Token: SeSecurityPrivilege 2928 winupdate.exe Token: SeTakeOwnershipPrivilege 2928 winupdate.exe Token: SeLoadDriverPrivilege 2928 winupdate.exe Token: SeSystemProfilePrivilege 2928 winupdate.exe Token: SeSystemtimePrivilege 2928 winupdate.exe Token: SeProfSingleProcessPrivilege 2928 winupdate.exe Token: SeIncBasePriorityPrivilege 2928 winupdate.exe Token: SeCreatePagefilePrivilege 2928 winupdate.exe Token: SeBackupPrivilege 2928 winupdate.exe Token: SeRestorePrivilege 2928 winupdate.exe Token: SeShutdownPrivilege 2928 winupdate.exe Token: SeDebugPrivilege 2928 winupdate.exe Token: SeSystemEnvironmentPrivilege 2928 winupdate.exe Token: SeChangeNotifyPrivilege 2928 winupdate.exe Token: SeRemoteShutdownPrivilege 2928 winupdate.exe Token: SeUndockPrivilege 2928 winupdate.exe Token: SeManageVolumePrivilege 2928 winupdate.exe Token: SeImpersonatePrivilege 2928 winupdate.exe Token: SeCreateGlobalPrivilege 2928 winupdate.exe Token: 33 2928 winupdate.exe Token: 34 2928 winupdate.exe Token: 35 2928 winupdate.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exewinupdate.exewinupdate.exepid Process 2032 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 2268 winupdate.exe 2928 winupdate.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exewinupdate.execmd.exedescription pid Process procid_target PID 2032 wrote to memory of 2124 2032 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2124 2032 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2124 2032 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2124 2032 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2124 2032 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2124 2032 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2124 2032 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2124 2032 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2124 2032 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2124 2032 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2124 2032 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2124 2032 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2124 2032 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2124 2032 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2124 2032 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2268 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 31 PID 2124 wrote to memory of 2268 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 31 PID 2124 wrote to memory of 2268 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 31 PID 2124 wrote to memory of 2268 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 31 PID 2124 wrote to memory of 2268 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 31 PID 2124 wrote to memory of 2268 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 31 PID 2124 wrote to memory of 2268 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 31 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2124 wrote to memory of 2196 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 33 PID 2124 wrote to memory of 2196 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 33 PID 2124 wrote to memory of 2196 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 33 PID 2124 wrote to memory of 2196 2124 920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe 33 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2268 wrote to memory of 2928 2268 winupdate.exe 32 PID 2196 wrote to memory of 2888 2196 cmd.exe 35 PID 2196 wrote to memory of 2888 2196 cmd.exe 35 PID 2196 wrote to memory of 2888 2196 cmd.exe 35 PID 2196 wrote to memory of 2888 2196 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\920a6ee052bcfaf17abf6977431a6bd8_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windupdt\winupdate.exe"C:\Windupdt\winupdate.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windupdt\winupdate.exe"C:\Windupdt\winupdate.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2928
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_dcsc_.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2888
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119B
MD57ba5dd426f7f9c1e5f618c38d790baef
SHA175ea8246885dd8a93a2e132ff52ee22847bba772
SHA2564c4af312adc80169275fafa86bdc5ce14e6acbeadd4dbfeaa65ef858abdc8f22
SHA5120d66ad4e00e21ec7725886923934625ace11f396f033a13faeeed6139a2967da2f2a5304f1f33bbffbaac4e289e0755c99d8ecfe6043b63f5a29bbac880e1de6
-
Filesize
805KB
MD5920a6ee052bcfaf17abf6977431a6bd8
SHA177541716906dc4be85ac39ea2dfced1a9ef57861
SHA256b088833e8dddce0b2f6d61ddefcfdc7e19941a46a8726df5efa90809cdc8f68d
SHA512871b134ed9d639409fc62e7f9a18ae25e673b528bf88b2e45b3931584b00c0b05f444ccb8467c6c34093b058b72833b0d1739d7bb1b6573ce25fb75c275a8f2d