Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 13:04
Behavioral task
behavioral1
Sample
94d7bc9e260423579441e97426115344_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
94d7bc9e260423579441e97426115344_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
94d7bc9e260423579441e97426115344
-
SHA1
1ebdf80e2623d1751e155a4247281a452f1bd23f
-
SHA256
a2b7577b883311a9d059a719d269f1f5fc0abc30efaa7ba912925c5ba40681cc
-
SHA512
273021aa8fd567aebe9a405996e7bb83f63dc66df4f88c3887a05ba9b709e362ecbc9c36be7abe47814c9d9095c72d3848a938790f2e15e15d595dab51990769
-
SSDEEP
24576:STvb1Q+wwPJksegeQMRaglkemV6r7dExwKKyClF1GrLI2TT2Qs6WZUPJg3:qvbawCvRzRag+eXXd+s4vI2nTsRmh
Malware Config
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Windupdt\\winupdate.exe" 94d7bc9e260423579441e97426115344_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winupdate.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "1" winupdate.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winupdate.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winupdate.exe -
Disables Task Manager via registry modification
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate winupdate.exe -
Executes dropped EXE 3 IoCs
pid Process 2084 HOOKENGINE.EXE 1520 winupdate.exe 2812 winupdate.exe -
Loads dropped DLL 9 IoCs
pid Process 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 1520 winupdate.exe 1520 winupdate.exe 1520 winupdate.exe 1520 winupdate.exe 2812 winupdate.exe 2812 winupdate.exe 2812 winupdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Windupdt\\winupdate.exe" 94d7bc9e260423579441e97426115344_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2532 set thread context of 2552 2532 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 30 PID 1520 set thread context of 2812 1520 winupdate.exe 33 -
resource yara_rule behavioral1/memory/2532-0-0x0000000000400000-0x000000000052E000-memory.dmp upx behavioral1/memory/2532-5-0x0000000000400000-0x000000000052E000-memory.dmp upx behavioral1/files/0x0008000000015d64-26.dat upx behavioral1/memory/1520-35-0x0000000000400000-0x000000000052E000-memory.dmp upx behavioral1/memory/1520-54-0x0000000000400000-0x000000000052E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HOOKENGINE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier winupdate.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier winupdate.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2812 winupdate.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeSecurityPrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeSystemtimePrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeBackupPrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeRestorePrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeShutdownPrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeDebugPrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeUndockPrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeManageVolumePrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeImpersonatePrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: 33 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: 34 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: 35 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe Token: 33 2084 HOOKENGINE.EXE Token: SeIncBasePriorityPrivilege 2084 HOOKENGINE.EXE Token: SeIncreaseQuotaPrivilege 2812 winupdate.exe Token: SeSecurityPrivilege 2812 winupdate.exe Token: SeTakeOwnershipPrivilege 2812 winupdate.exe Token: SeLoadDriverPrivilege 2812 winupdate.exe Token: SeSystemProfilePrivilege 2812 winupdate.exe Token: SeSystemtimePrivilege 2812 winupdate.exe Token: SeProfSingleProcessPrivilege 2812 winupdate.exe Token: SeIncBasePriorityPrivilege 2812 winupdate.exe Token: SeCreatePagefilePrivilege 2812 winupdate.exe Token: SeBackupPrivilege 2812 winupdate.exe Token: SeRestorePrivilege 2812 winupdate.exe Token: SeShutdownPrivilege 2812 winupdate.exe Token: SeDebugPrivilege 2812 winupdate.exe Token: SeSystemEnvironmentPrivilege 2812 winupdate.exe Token: SeChangeNotifyPrivilege 2812 winupdate.exe Token: SeRemoteShutdownPrivilege 2812 winupdate.exe Token: SeUndockPrivilege 2812 winupdate.exe Token: SeManageVolumePrivilege 2812 winupdate.exe Token: SeImpersonatePrivilege 2812 winupdate.exe Token: SeCreateGlobalPrivilege 2812 winupdate.exe Token: 33 2812 winupdate.exe Token: 34 2812 winupdate.exe Token: 35 2812 winupdate.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2532 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 1520 winupdate.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2552 2532 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2552 2532 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2552 2532 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2552 2532 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2552 2532 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2552 2532 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2552 2532 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2552 2532 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2552 2532 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2552 2532 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2552 2532 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2552 2532 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2552 2532 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2552 2532 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 30 PID 2532 wrote to memory of 2552 2532 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2084 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2084 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2084 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2084 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 31 PID 2552 wrote to memory of 1520 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 32 PID 2552 wrote to memory of 1520 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 32 PID 2552 wrote to memory of 1520 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 32 PID 2552 wrote to memory of 1520 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 32 PID 2552 wrote to memory of 1520 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 32 PID 2552 wrote to memory of 1520 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 32 PID 2552 wrote to memory of 1520 2552 94d7bc9e260423579441e97426115344_JaffaCakes118.exe 32 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33 PID 1520 wrote to memory of 2812 1520 winupdate.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\94d7bc9e260423579441e97426115344_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\94d7bc9e260423579441e97426115344_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\94d7bc9e260423579441e97426115344_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\94d7bc9e260423579441e97426115344_JaffaCakes118.exe2⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\HOOKENGINE.EXE"C:\Users\Admin\AppData\Local\Temp\HOOKENGINE.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\ProgramData\Microsoft\Windows\Start Menu\Windupdt\winupdate.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Windupdt\winupdate.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\ProgramData\Microsoft\Windows\Start Menu\Windupdt\winupdate.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Windupdt\winupdate.exe"4⤵
- Modifies firewall policy service
- Disables RegEdit via registry modification
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD594d7bc9e260423579441e97426115344
SHA11ebdf80e2623d1751e155a4247281a452f1bd23f
SHA256a2b7577b883311a9d059a719d269f1f5fc0abc30efaa7ba912925c5ba40681cc
SHA512273021aa8fd567aebe9a405996e7bb83f63dc66df4f88c3887a05ba9b709e362ecbc9c36be7abe47814c9d9095c72d3848a938790f2e15e15d595dab51990769
-
Filesize
372KB
MD56fb2d610ebc126d3cf71312fcda8ddd7
SHA1ffc62d8a69a6a5fe0ea3ca519c38b2599c925866
SHA2560311327b204541fe9a7e8d2519faa2f109e3a8683a3ba5aa9b16da3cf923eb34
SHA51283b70e5a7fe46c576f528572627fa5a8a1f6dd16bfec21d0f23661485137890a9ba360a134ba6e6e2907e2878a5f4c256918b6392783d5b76da35b7730f26d31