Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 13:32
Static task
static1
Behavioral task
behavioral1
Sample
94fc05361686cc76105724d8cc663f21_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
94fc05361686cc76105724d8cc663f21_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
94fc05361686cc76105724d8cc663f21_JaffaCakes118.exe
-
Size
766KB
-
MD5
94fc05361686cc76105724d8cc663f21
-
SHA1
b9e21c902130a80a15184cd7cc1d676179308fcc
-
SHA256
54e2ab2dbcb18c522c92f64a482234523d6e653d765376fba092deb16095c112
-
SHA512
b27dbbb363208be0cec6b3d7c5c1997141640aedbc48033fffd22e4d5cd6ebc5e0fc196340190444371c58bc36c9e8ea2311ae7ab5b5482accbb2519306dff4a
-
SSDEEP
12288:MWM00blAckjJmUgFuSYSTKBA0Plr1dSCCHTp1/nW2BqsvD2MjQ:1M00bOcYJmX85SMA0DCN1ZDY
Malware Config
Extracted
darkcomet
FUN
spr35check.myftp.org:1604
DC_MUTEX-Q1V5UCQ
-
InstallPath
Microsoft\Windows\Firewall\firewallws.exe
-
gencode
7atKmF9TabN3
-
install
true
-
offline_keylogger
false
-
persistence
false
-
reg_key
Windows Firewall
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\Windows\\Firewall\\firewallws.exe" CheatPack.exe -
Deletes itself 1 IoCs
pid Process 2768 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2760 CheatPack.exe 2684 firewallws.exe -
Loads dropped DLL 4 IoCs
pid Process 2872 94fc05361686cc76105724d8cc663f21_JaffaCakes118.exe 2872 94fc05361686cc76105724d8cc663f21_JaffaCakes118.exe 2760 CheatPack.exe 2760 CheatPack.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Firewall = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\Windows\\Firewall\\firewallws.exe" CheatPack.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
resource yara_rule behavioral1/files/0x000d0000000133b8-3.dat upx behavioral1/memory/2760-11-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2760-20-0x0000000003690000-0x00000000037FC000-memory.dmp upx behavioral1/memory/2684-27-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2760-30-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2684-31-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2684-32-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2684-33-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2684-34-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2684-35-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2684-36-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2684-37-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2684-38-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2684-39-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2684-40-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2684-41-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2684-42-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2684-43-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2684-44-0x0000000000400000-0x000000000056C000-memory.dmp upx behavioral1/memory/2684-45-0x0000000000400000-0x000000000056C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94fc05361686cc76105724d8cc663f21_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CheatPack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firewallws.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2760 CheatPack.exe Token: SeSecurityPrivilege 2760 CheatPack.exe Token: SeTakeOwnershipPrivilege 2760 CheatPack.exe Token: SeLoadDriverPrivilege 2760 CheatPack.exe Token: SeSystemProfilePrivilege 2760 CheatPack.exe Token: SeSystemtimePrivilege 2760 CheatPack.exe Token: SeProfSingleProcessPrivilege 2760 CheatPack.exe Token: SeIncBasePriorityPrivilege 2760 CheatPack.exe Token: SeCreatePagefilePrivilege 2760 CheatPack.exe Token: SeBackupPrivilege 2760 CheatPack.exe Token: SeRestorePrivilege 2760 CheatPack.exe Token: SeShutdownPrivilege 2760 CheatPack.exe Token: SeDebugPrivilege 2760 CheatPack.exe Token: SeSystemEnvironmentPrivilege 2760 CheatPack.exe Token: SeChangeNotifyPrivilege 2760 CheatPack.exe Token: SeRemoteShutdownPrivilege 2760 CheatPack.exe Token: SeUndockPrivilege 2760 CheatPack.exe Token: SeManageVolumePrivilege 2760 CheatPack.exe Token: SeImpersonatePrivilege 2760 CheatPack.exe Token: SeCreateGlobalPrivilege 2760 CheatPack.exe Token: 33 2760 CheatPack.exe Token: 34 2760 CheatPack.exe Token: 35 2760 CheatPack.exe Token: SeIncreaseQuotaPrivilege 2684 firewallws.exe Token: SeSecurityPrivilege 2684 firewallws.exe Token: SeTakeOwnershipPrivilege 2684 firewallws.exe Token: SeLoadDriverPrivilege 2684 firewallws.exe Token: SeSystemProfilePrivilege 2684 firewallws.exe Token: SeSystemtimePrivilege 2684 firewallws.exe Token: SeProfSingleProcessPrivilege 2684 firewallws.exe Token: SeIncBasePriorityPrivilege 2684 firewallws.exe Token: SeCreatePagefilePrivilege 2684 firewallws.exe Token: SeBackupPrivilege 2684 firewallws.exe Token: SeRestorePrivilege 2684 firewallws.exe Token: SeShutdownPrivilege 2684 firewallws.exe Token: SeDebugPrivilege 2684 firewallws.exe Token: SeSystemEnvironmentPrivilege 2684 firewallws.exe Token: SeChangeNotifyPrivilege 2684 firewallws.exe Token: SeRemoteShutdownPrivilege 2684 firewallws.exe Token: SeUndockPrivilege 2684 firewallws.exe Token: SeManageVolumePrivilege 2684 firewallws.exe Token: SeImpersonatePrivilege 2684 firewallws.exe Token: SeCreateGlobalPrivilege 2684 firewallws.exe Token: 33 2684 firewallws.exe Token: 34 2684 firewallws.exe Token: 35 2684 firewallws.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2760 2872 94fc05361686cc76105724d8cc663f21_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2760 2872 94fc05361686cc76105724d8cc663f21_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2760 2872 94fc05361686cc76105724d8cc663f21_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2760 2872 94fc05361686cc76105724d8cc663f21_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2768 2872 94fc05361686cc76105724d8cc663f21_JaffaCakes118.exe 31 PID 2872 wrote to memory of 2768 2872 94fc05361686cc76105724d8cc663f21_JaffaCakes118.exe 31 PID 2872 wrote to memory of 2768 2872 94fc05361686cc76105724d8cc663f21_JaffaCakes118.exe 31 PID 2872 wrote to memory of 2768 2872 94fc05361686cc76105724d8cc663f21_JaffaCakes118.exe 31 PID 2760 wrote to memory of 2684 2760 CheatPack.exe 33 PID 2760 wrote to memory of 2684 2760 CheatPack.exe 33 PID 2760 wrote to memory of 2684 2760 CheatPack.exe 33 PID 2760 wrote to memory of 2684 2760 CheatPack.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\94fc05361686cc76105724d8cc663f21_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\94fc05361686cc76105724d8cc663f21_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\CheatPack.exe"C:\Users\Admin\AppData\Local\Temp\CheatPack.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Microsoft\Windows\Firewall\firewallws.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft\Windows\Firewall\firewallws.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\94fc05361686cc76105724d8cc663f21_JaffaCakes118.exe" >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
614KB
MD59dd33992badc2b679b1afbefc8861462
SHA1cba96323bad050be9ff144f836eaabda9d7d9356
SHA256162c082359424b4ed326fb91c4c2cbcb485f291fe6c3ed0a9885a7904664319d
SHA5129ecb81b561b3a5c9963f94e1164ef062af0e889074a4d770035359e21320612920f3e3ec10fcc3e4a9bd39e4d6e3779a982046b8c98a304d78d2d16beaf29555