Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
cea0ff40beb91736ba2442b69237667b_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
cea0ff40beb91736ba2442b69237667b_JaffaCakes118.exe
-
Size
926KB
-
MD5
cea0ff40beb91736ba2442b69237667b
-
SHA1
a43ca7c487363b53158573b25cc29888763cc626
-
SHA256
96a973f6ec1b985ad4224870800fbbe369e5838dbc994c16d7ce8f8c3b30e8a1
-
SHA512
3a1298c556a36a27e8e48540abea44728ce2b06d7f41a0c8478161078d6a0773728013acce007a23ca433bbbef0e1160f857e1618a4b16fda9c8b5199d936397
-
SSDEEP
24576:0vVGhnqrpqUruyeG0ZN3DIeriQv0XwQjGp:PJ48UKfGw1DniQveg
Malware Config
Extracted
darkcomet
M@trix
matrixgx.no-ip.biz:1604
DC_MUTEX-LCLDLR3
-
InstallPath
RealPlayer\%TEMP%.exe
-
gencode
kzX7VMDXdUly
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
RealUpd
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\RealPlayer\\%TEMP%.exe" 1.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile %TEMP%.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" %TEMP%.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" %TEMP%.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation cea0ff40beb91736ba2442b69237667b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 1.exe -
Executes dropped EXE 3 IoCs
pid Process 3520 1.exe 4780 2.exe 4668 %TEMP%.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RealUpd = "C:\\Users\\Admin\\AppData\\Roaming\\RealPlayer\\%TEMP%.exe" 1.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RealUpd = "C:\\Users\\Admin\\AppData\\Roaming\\RealPlayer\\%TEMP%.exe" %TEMP%.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini cea0ff40beb91736ba2442b69237667b_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini cea0ff40beb91736ba2442b69237667b_JaffaCakes118.exe -
resource yara_rule behavioral2/files/0x0007000000023c9e-21.dat upx behavioral2/memory/4780-26-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral2/memory/4780-92-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral2/memory/4780-93-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral2/memory/4780-95-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral2/memory/4780-97-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral2/memory/4780-99-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral2/memory/4780-101-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral2/memory/4780-103-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral2/memory/4780-105-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral2/memory/4780-107-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral2/memory/4780-109-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral2/memory/4780-111-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral2/memory/4780-113-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral2/memory/4780-115-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral2/memory/4780-117-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral2/memory/4780-119-0x0000000000400000-0x000000000079B000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini cea0ff40beb91736ba2442b69237667b_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini cea0ff40beb91736ba2442b69237667b_JaffaCakes118.exe File opened for modification C:\Windows\assembly cea0ff40beb91736ba2442b69237667b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 1.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4780 2.exe 4668 %TEMP%.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3520 1.exe Token: SeSecurityPrivilege 3520 1.exe Token: SeTakeOwnershipPrivilege 3520 1.exe Token: SeLoadDriverPrivilege 3520 1.exe Token: SeSystemProfilePrivilege 3520 1.exe Token: SeSystemtimePrivilege 3520 1.exe Token: SeProfSingleProcessPrivilege 3520 1.exe Token: SeIncBasePriorityPrivilege 3520 1.exe Token: SeCreatePagefilePrivilege 3520 1.exe Token: SeBackupPrivilege 3520 1.exe Token: SeRestorePrivilege 3520 1.exe Token: SeShutdownPrivilege 3520 1.exe Token: SeDebugPrivilege 3520 1.exe Token: SeSystemEnvironmentPrivilege 3520 1.exe Token: SeChangeNotifyPrivilege 3520 1.exe Token: SeRemoteShutdownPrivilege 3520 1.exe Token: SeUndockPrivilege 3520 1.exe Token: SeManageVolumePrivilege 3520 1.exe Token: SeImpersonatePrivilege 3520 1.exe Token: SeCreateGlobalPrivilege 3520 1.exe Token: 33 3520 1.exe Token: 34 3520 1.exe Token: 35 3520 1.exe Token: 36 3520 1.exe Token: 33 5024 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5024 AUDIODG.EXE Token: SeIncreaseQuotaPrivilege 4668 %TEMP%.exe Token: SeSecurityPrivilege 4668 %TEMP%.exe Token: SeTakeOwnershipPrivilege 4668 %TEMP%.exe Token: SeLoadDriverPrivilege 4668 %TEMP%.exe Token: SeSystemProfilePrivilege 4668 %TEMP%.exe Token: SeSystemtimePrivilege 4668 %TEMP%.exe Token: SeProfSingleProcessPrivilege 4668 %TEMP%.exe Token: SeIncBasePriorityPrivilege 4668 %TEMP%.exe Token: SeCreatePagefilePrivilege 4668 %TEMP%.exe Token: SeBackupPrivilege 4668 %TEMP%.exe Token: SeRestorePrivilege 4668 %TEMP%.exe Token: SeShutdownPrivilege 4668 %TEMP%.exe Token: SeDebugPrivilege 4668 %TEMP%.exe Token: SeSystemEnvironmentPrivilege 4668 %TEMP%.exe Token: SeChangeNotifyPrivilege 4668 %TEMP%.exe Token: SeRemoteShutdownPrivilege 4668 %TEMP%.exe Token: SeUndockPrivilege 4668 %TEMP%.exe Token: SeManageVolumePrivilege 4668 %TEMP%.exe Token: SeImpersonatePrivilege 4668 %TEMP%.exe Token: SeCreateGlobalPrivilege 4668 %TEMP%.exe Token: 33 4668 %TEMP%.exe Token: 34 4668 %TEMP%.exe Token: 35 4668 %TEMP%.exe Token: 36 4668 %TEMP%.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4668 %TEMP%.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2804 wrote to memory of 3520 2804 cea0ff40beb91736ba2442b69237667b_JaffaCakes118.exe 83 PID 2804 wrote to memory of 3520 2804 cea0ff40beb91736ba2442b69237667b_JaffaCakes118.exe 83 PID 2804 wrote to memory of 3520 2804 cea0ff40beb91736ba2442b69237667b_JaffaCakes118.exe 83 PID 2804 wrote to memory of 4780 2804 cea0ff40beb91736ba2442b69237667b_JaffaCakes118.exe 84 PID 2804 wrote to memory of 4780 2804 cea0ff40beb91736ba2442b69237667b_JaffaCakes118.exe 84 PID 2804 wrote to memory of 4780 2804 cea0ff40beb91736ba2442b69237667b_JaffaCakes118.exe 84 PID 3520 wrote to memory of 4668 3520 1.exe 86 PID 3520 wrote to memory of 4668 3520 1.exe 86 PID 3520 wrote to memory of 4668 3520 1.exe 86 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87 PID 4668 wrote to memory of 3588 4668 %TEMP%.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\cea0ff40beb91736ba2442b69237667b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cea0ff40beb91736ba2442b69237667b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Roaming\RealPlayer\%TEMP%.exe"C:\Users\Admin\AppData\Roaming\RealPlayer\%TEMP%.exe"3⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\notepad.exenotepad4⤵
- System Location Discovery: System Language Discovery
PID:3588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:4780
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x244 0x2401⤵
- Suspicious use of AdjustPrivilegeToken
PID:5024
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
690KB
MD545eb357bd7e13451a15e96c151f85d71
SHA11c69258927c4e2dcc7b154fdf64468e2d62dde4e
SHA256c97da2ada1e7f2a498995d806542181bd0e42283f01a158e4abb917733cf151d
SHA512c439d6e9efdb74bb1405849a1356399a7a538b2dacec9a5f09953ff9ef12b257e325127ecbc0898734f1907648a6209a5151ba740a71bfd7f5fa3f8fa56291f3
-
Filesize
222KB
MD55bf28e61b1c3ec7f3ede92262a8e7231
SHA12c15790344fddfea7d76a31776b4c3be036c5bc9
SHA2569c0208af1eeb9f75c5fd3971a816ca30947c935fa4a29fec97a4574312b4522e
SHA512e52acc2dafc665753693d61f5cdc0548bcf6f27e6412751bd5f7dc1cfdd3cd79f3a2496242e955aa4d9e5a1be8855885d3b8949c0e6e1fd0367cad6794e1aaab