Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
a7d36192fa60ef5da7eda74fdc005fcf
-
SHA1
91fe5e8362a4db0b7c57bf3ccabdecf11c44c110
-
SHA256
6e9f429578e917fc61bf2a00f7c66d5742fa5ace0a34a6a05cd7380dba890f1a
-
SHA512
d16a1d60b14f8502555f88e95ef49c3ab4d384d1d1472c333143430cb101a222db9ad5c6a6d1e571fd5079db3d863c8f8e7f56d42bdef3cdddd21539ab102912
-
SSDEEP
12288:lun+lYhAKRGkxPEknV3OW/+7urXSJP5ATY9cMUftoYvhMlnW1Asnu9orv+yJn81i:lulnyAKQlmofX77a1JstbNld
Malware Config
Signatures
-
Darkcomet family
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Testing = "C:\\ProgramData\\Svg64.exe" a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1852 set thread context of 2944 1852 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2944 1852 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 30 PID 1852 wrote to memory of 2944 1852 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 30 PID 1852 wrote to memory of 2944 1852 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 30 PID 1852 wrote to memory of 2944 1852 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 30 PID 1852 wrote to memory of 2944 1852 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 30 PID 1852 wrote to memory of 2944 1852 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 30 PID 1852 wrote to memory of 2944 1852 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 30 PID 1852 wrote to memory of 2944 1852 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 30 PID 1852 wrote to memory of 2944 1852 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 30 PID 1852 wrote to memory of 2944 1852 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 30 PID 1852 wrote to memory of 2944 1852 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 30 PID 1852 wrote to memory of 2944 1852 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 30 PID 1852 wrote to memory of 2944 1852 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:2944
-