Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 19:50
Behavioral task
behavioral1
Sample
b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe
-
Size
713KB
-
MD5
b9e35c88cd9ad3d9ab974984da9c46a3
-
SHA1
673de3456726901eef20fa19c98f08f0c50e35d4
-
SHA256
e1d10981abcaacfe456b45c752433ab5494df4544dbfa4ed85623ebdecde7bc4
-
SHA512
d48324a72109333b53c66813fce02a3b6c49ecacd5865088d6051353eb1e53a22d64e56e1532c3791e0e4670b4e572b7a0b67fb331543a03b4d08cb023e39900
-
SSDEEP
12288:gaAchpWsuVtDnBsBDJIcynnC90levX4CuYf2D82T3s99+VHuNKD:RAEE3uBDhynCylQgi63O9+VuNy
Malware Config
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windupdt\\winupdate.exe" b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "1" winupdate.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" winupdate.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winupdate.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winupdate.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate winupdate.exe -
Executes dropped EXE 1 IoCs
pid Process 2668 winupdate.exe -
Loads dropped DLL 4 IoCs
pid Process 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe 2668 winupdate.exe 2668 winupdate.exe 2668 winupdate.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winupdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier winupdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier winupdate.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeSecurityPrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeLoadDriverPrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeSystemProfilePrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeSystemtimePrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeBackupPrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeRestorePrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeShutdownPrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeDebugPrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeUndockPrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeManageVolumePrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeImpersonatePrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: 33 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: 34 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: 35 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2668 winupdate.exe Token: SeSecurityPrivilege 2668 winupdate.exe Token: SeTakeOwnershipPrivilege 2668 winupdate.exe Token: SeLoadDriverPrivilege 2668 winupdate.exe Token: SeSystemProfilePrivilege 2668 winupdate.exe Token: SeSystemtimePrivilege 2668 winupdate.exe Token: SeProfSingleProcessPrivilege 2668 winupdate.exe Token: SeIncBasePriorityPrivilege 2668 winupdate.exe Token: SeCreatePagefilePrivilege 2668 winupdate.exe Token: SeBackupPrivilege 2668 winupdate.exe Token: SeRestorePrivilege 2668 winupdate.exe Token: SeShutdownPrivilege 2668 winupdate.exe Token: SeDebugPrivilege 2668 winupdate.exe Token: SeSystemEnvironmentPrivilege 2668 winupdate.exe Token: SeChangeNotifyPrivilege 2668 winupdate.exe Token: SeRemoteShutdownPrivilege 2668 winupdate.exe Token: SeUndockPrivilege 2668 winupdate.exe Token: SeManageVolumePrivilege 2668 winupdate.exe Token: SeImpersonatePrivilege 2668 winupdate.exe Token: SeCreateGlobalPrivilege 2668 winupdate.exe Token: 33 2668 winupdate.exe Token: 34 2668 winupdate.exe Token: 35 2668 winupdate.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2668 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe 29 PID 1624 wrote to memory of 2668 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe 29 PID 1624 wrote to memory of 2668 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe 29 PID 1624 wrote to memory of 2668 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe 29 PID 1624 wrote to memory of 2668 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe 29 PID 1624 wrote to memory of 2668 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe 29 PID 1624 wrote to memory of 2668 1624 b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b9e35c88cd9ad3d9ab974984da9c46a3_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windupdt\winupdate.exe"C:\Windupdt\winupdate.exe"2⤵
- Modifies firewall policy service
- Windows security bypass
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
713KB
MD5b9e35c88cd9ad3d9ab974984da9c46a3
SHA1673de3456726901eef20fa19c98f08f0c50e35d4
SHA256e1d10981abcaacfe456b45c752433ab5494df4544dbfa4ed85623ebdecde7bc4
SHA512d48324a72109333b53c66813fce02a3b6c49ecacd5865088d6051353eb1e53a22d64e56e1532c3791e0e4670b4e572b7a0b67fb331543a03b4d08cb023e39900