Analysis
-
max time kernel
94s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
a7d36192fa60ef5da7eda74fdc005fcf
-
SHA1
91fe5e8362a4db0b7c57bf3ccabdecf11c44c110
-
SHA256
6e9f429578e917fc61bf2a00f7c66d5742fa5ace0a34a6a05cd7380dba890f1a
-
SHA512
d16a1d60b14f8502555f88e95ef49c3ab4d384d1d1472c333143430cb101a222db9ad5c6a6d1e571fd5079db3d863c8f8e7f56d42bdef3cdddd21539ab102912
-
SSDEEP
12288:lun+lYhAKRGkxPEknV3OW/+7urXSJP5ATY9cMUftoYvhMlnW1Asnu9orv+yJn81i:lulnyAKQlmofX77a1JstbNld
Malware Config
Signatures
-
Darkcomet family
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Testing = "C:\\ProgramData\\Svg64.exe" a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3488 set thread context of 1428 3488 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 82 -
Program crash 1 IoCs
pid pid_target Process procid_target 2068 1428 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3488 wrote to memory of 1428 3488 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 82 PID 3488 wrote to memory of 1428 3488 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 82 PID 3488 wrote to memory of 1428 3488 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 82 PID 3488 wrote to memory of 1428 3488 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 82 PID 3488 wrote to memory of 1428 3488 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 82 PID 3488 wrote to memory of 1428 3488 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 82 PID 3488 wrote to memory of 1428 3488 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 82 PID 3488 wrote to memory of 1428 3488 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 82 PID 3488 wrote to memory of 1428 3488 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 82 PID 3488 wrote to memory of 1428 3488 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 82 PID 3488 wrote to memory of 1428 3488 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 82 PID 3488 wrote to memory of 1428 3488 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 82 PID 3488 wrote to memory of 1428 3488 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 82 PID 3488 wrote to memory of 1428 3488 a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a7d36192fa60ef5da7eda74fdc005fcf_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 123⤵
- Program crash
PID:2068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1428 -ip 14281⤵PID:3740