Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 15:47
Static task
static1
Behavioral task
behavioral1
Sample
b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
b24234d0209cdfad1e5cba875eb55354
-
SHA1
899c4e1c8d44a581e7aa033aa43b2ab7bb29f296
-
SHA256
eb49514b8692a9659a1c49ccde9b21677abb8e01590d86271f66d36bc06bccdf
-
SHA512
e84494172d62d95519c653c5bb8d1b37ee97e3da78910db6ae8f304c54a436aedd07618918d27b6cf2603b244cb388045838a2cde8e5f5e20517dbeb966e47ff
-
SSDEEP
24576:QtnoXTKpkjcty9FrjuZPfrlnii7liPAkSvWhgAUlP:SoXwAjoPjlJ1uhgA
Malware Config
Signatures
-
Darkcomet family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2100 set thread context of 2284 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2752 ipconfig.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2204 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2204 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2204 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2204 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2284 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2284 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2284 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2284 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2284 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2284 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2284 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2284 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2284 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2284 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2284 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2284 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2840 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 32 PID 2100 wrote to memory of 2840 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 32 PID 2100 wrote to memory of 2840 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 32 PID 2100 wrote to memory of 2840 2100 b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe 32 PID 2840 wrote to memory of 2752 2840 cmd.exe 34 PID 2840 wrote to memory of 2752 2840 cmd.exe 34 PID 2840 wrote to memory of 2752 2840 cmd.exe 34 PID 2840 wrote to memory of 2752 2840 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b24234d0209cdfad1e5cba875eb55354_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:2204
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:2284
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DNS.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdnsipconfig/releaseipconfig/renew3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47B
MD54b403bd7ff6fe021fcf3ecdd2c029f87
SHA1890642fc02dbfffd5d3aef0ec652fa636a48c3ee
SHA256267c9197388ab6b34c7516e728a3529df2b7aab5029588ffb47540bbe651f654
SHA5123bdef29cfeab451d45182420bd179f9450a0da5c842992260a420728e212635f90cc1f394687c8ac852ccd8caf529e9bdb4aff24e2d07f6705594931b3ef5e6d
-
Filesize
1KB
MD51e3bac557fd2718212f2306ab9671b47
SHA149e39343e82d3ec38063ef327832f2a0fbacc8d1
SHA2561fa11e0761fa0471e28ebe32015cb75aa9758bfc05b54827867f97408d498986
SHA512483f898930ad7f7485a7586dc2198a3f3254e4076bc7556ec67a47fbd9bb9a88713f6690884eedb3cecb913457465ce623bf29a4cdb4fc59dc40ef5d1acc45bd