Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 07:57
Static task
static1
Behavioral task
behavioral1
Sample
d604a165826a3df124f663479b0607b5_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d604a165826a3df124f663479b0607b5_JaffaCakes118.exe
-
Size
748KB
-
MD5
d604a165826a3df124f663479b0607b5
-
SHA1
f3afcb70f500c2dcdb2fc0edd6869c31b43dc792
-
SHA256
1001065dcc00ff8d14c2166940a2936b1ff78c3cffa17eb75b502a2a9a932a2c
-
SHA512
00f0c02b13fd7806cd8664b5278b3a21785f8dd8871655d7af24794c46a0c39514648d25f33d1b33b7967dd3bec0882051205d26decc12a10f2a6a54589a9ebf
-
SSDEEP
12288:M5S3h2B5NGhJIrb6RgGKKmsDkAuTVGH6Txqa0m6vo:iyhRyrb6SGKWuRGHHad6w
Malware Config
Extracted
darkcomet
DonGaa
euro2012.zapto.org:3389
olympic2012.zapto.org:3390
DC_MUTEX-RK8JYCB
-
InstallPath
java\jar.exe
-
gencode
MfdGPqFwSQrd
-
install
true
-
offline_keylogger
true
-
password
123
-
persistence
true
-
reg_key
Microsoffpdate
Extracted
latentbot
olympic2012.zapto.org
Signatures
-
Darkcomet family
-
Latentbot family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\java\\jar.exe" out.exe -
Executes dropped EXE 4 IoCs
pid Process 2868 out.exe 2332 out.exe 2204 jar.exe 1172 jar.exe -
Loads dropped DLL 5 IoCs
pid Process 2984 d604a165826a3df124f663479b0607b5_JaffaCakes118.exe 2984 d604a165826a3df124f663479b0607b5_JaffaCakes118.exe 2868 out.exe 2332 out.exe 2332 out.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoffpdate = "C:\\Users\\Admin\\AppData\\Roaming\\java\\jar.exe" out.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoffpdate = "C:\\Users\\Admin\\AppData\\Roaming\\java\\jar.exe" jar.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\IgfxTray = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe" d604a165826a3df124f663479b0607b5_JaffaCakes118.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2868 set thread context of 2332 2868 out.exe 32 PID 2204 set thread context of 1172 2204 jar.exe 35 PID 2984 set thread context of 3028 2984 d604a165826a3df124f663479b0607b5_JaffaCakes118.exe 37 PID 3028 set thread context of 2920 3028 d604a165826a3df124f663479b0607b5_JaffaCakes118.exe 38 -
resource yara_rule behavioral1/files/0x0004000000004ed7-4.dat upx behavioral1/memory/2984-5-0x0000000003840000-0x00000000038A0000-memory.dmp upx behavioral1/memory/2868-14-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2332-17-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2332-21-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2332-19-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2332-22-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2868-24-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2332-25-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2332-26-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2332-27-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2332-56-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2204-60-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2204-67-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1172-68-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/1172-69-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2920-117-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/2920-135-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1172-137-0x0000000000400000-0x00000000004BA000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d604a165826a3df124f663479b0607b5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d604a165826a3df124f663479b0607b5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d604a165826a3df124f663479b0607b5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language out.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language out.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2332 out.exe Token: SeSecurityPrivilege 2332 out.exe Token: SeTakeOwnershipPrivilege 2332 out.exe Token: SeLoadDriverPrivilege 2332 out.exe Token: SeSystemProfilePrivilege 2332 out.exe Token: SeSystemtimePrivilege 2332 out.exe Token: SeProfSingleProcessPrivilege 2332 out.exe Token: SeIncBasePriorityPrivilege 2332 out.exe Token: SeCreatePagefilePrivilege 2332 out.exe Token: SeBackupPrivilege 2332 out.exe Token: SeRestorePrivilege 2332 out.exe Token: SeShutdownPrivilege 2332 out.exe Token: SeDebugPrivilege 2332 out.exe Token: SeSystemEnvironmentPrivilege 2332 out.exe Token: SeChangeNotifyPrivilege 2332 out.exe Token: SeRemoteShutdownPrivilege 2332 out.exe Token: SeUndockPrivilege 2332 out.exe Token: SeManageVolumePrivilege 2332 out.exe Token: SeImpersonatePrivilege 2332 out.exe Token: SeCreateGlobalPrivilege 2332 out.exe Token: 33 2332 out.exe Token: 34 2332 out.exe Token: 35 2332 out.exe Token: SeIncreaseQuotaPrivilege 1172 jar.exe Token: SeSecurityPrivilege 1172 jar.exe Token: SeTakeOwnershipPrivilege 1172 jar.exe Token: SeLoadDriverPrivilege 1172 jar.exe Token: SeSystemProfilePrivilege 1172 jar.exe Token: SeSystemtimePrivilege 1172 jar.exe Token: SeProfSingleProcessPrivilege 1172 jar.exe Token: SeIncBasePriorityPrivilege 1172 jar.exe Token: SeCreatePagefilePrivilege 1172 jar.exe Token: SeBackupPrivilege 1172 jar.exe Token: SeRestorePrivilege 1172 jar.exe Token: SeShutdownPrivilege 1172 jar.exe Token: SeDebugPrivilege 1172 jar.exe Token: SeSystemEnvironmentPrivilege 1172 jar.exe Token: SeChangeNotifyPrivilege 1172 jar.exe Token: SeRemoteShutdownPrivilege 1172 jar.exe Token: SeUndockPrivilege 1172 jar.exe Token: SeManageVolumePrivilege 1172 jar.exe Token: SeImpersonatePrivilege 1172 jar.exe Token: SeCreateGlobalPrivilege 1172 jar.exe Token: 33 1172 jar.exe Token: 34 1172 jar.exe Token: 35 1172 jar.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2984 d604a165826a3df124f663479b0607b5_JaffaCakes118.exe 2868 out.exe 2204 jar.exe 1172 jar.exe 3028 d604a165826a3df124f663479b0607b5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2868 2984 d604a165826a3df124f663479b0607b5_JaffaCakes118.exe 31 PID 2984 wrote to memory of 2868 2984 d604a165826a3df124f663479b0607b5_JaffaCakes118.exe 31 PID 2984 wrote to memory of 2868 2984 d604a165826a3df124f663479b0607b5_JaffaCakes118.exe 31 PID 2984 wrote to memory of 2868 2984 d604a165826a3df124f663479b0607b5_JaffaCakes118.exe 31 PID 2868 wrote to memory of 2332 2868 out.exe 32 PID 2868 wrote to memory of 2332 2868 out.exe 32 PID 2868 wrote to memory of 2332 2868 out.exe 32 PID 2868 wrote to memory of 2332 2868 out.exe 32 PID 2868 wrote to memory of 2332 2868 out.exe 32 PID 2868 wrote to memory of 2332 2868 out.exe 32 PID 2868 wrote to memory of 2332 2868 out.exe 32 PID 2868 wrote to memory of 2332 2868 out.exe 32 PID 2868 wrote to memory of 2332 2868 out.exe 32 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2772 2332 out.exe 33 PID 2332 wrote to memory of 2204 2332 out.exe 34 PID 2332 wrote to memory of 2204 2332 out.exe 34 PID 2332 wrote to memory of 2204 2332 out.exe 34 PID 2332 wrote to memory of 2204 2332 out.exe 34 PID 2204 wrote to memory of 1172 2204 jar.exe 35 PID 2204 wrote to memory of 1172 2204 jar.exe 35 PID 2204 wrote to memory of 1172 2204 jar.exe 35 PID 2204 wrote to memory of 1172 2204 jar.exe 35 PID 2204 wrote to memory of 1172 2204 jar.exe 35 PID 2204 wrote to memory of 1172 2204 jar.exe 35 PID 2204 wrote to memory of 1172 2204 jar.exe 35 PID 2204 wrote to memory of 1172 2204 jar.exe 35 PID 2204 wrote to memory of 1172 2204 jar.exe 35 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36 PID 1172 wrote to memory of 1664 1172 jar.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\d604a165826a3df124f663479b0607b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d604a165826a3df124f663479b0607b5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\out.exe"C:\Users\Admin\AppData\Local\Temp\out.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\out.exe"C:\Users\Admin\AppData\Local\Temp\out.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\notepad.exenotepad4⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Users\Admin\AppData\Roaming\java\jar.exe"C:\Users\Admin\AppData\Roaming\java\jar.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Roaming\java\jar.exe"C:\Users\Admin\AppData\Roaming\java\jar.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\notepad.exenotepad6⤵
- System Location Discovery: System Language Discovery
PID:1664
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\d604a165826a3df124f663479b0607b5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d604a165826a3df124f663479b0607b5_JaffaCakes118.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\d604a165826a3df124f663479b0607b5_JaffaCakes118.exe/scomma "C:\Users\Admin\AppData\Local\Temp\TncEnqc0PV.ini"3⤵
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\GkVhrbN.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:808
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263B
MD5f6fa97ac595aab50b7ffb2d6592865fb
SHA176530c92e501d4619cceee8901a23862fc4638d9
SHA25698036dba5197d400c3d31412523c877bda50ebd0e9212275100b3ea6cef55570
SHA512b421a379a14c90cb59cb6e3ad10d507496d86cc227af0ce574bdd18891e4adedb187c3c91435d5c61f25d40a2b5772b46a93ec105deaffec3b00b30a9a3d4248
-
Filesize
5B
MD5d1ea279fb5559c020a1b4137dc4de237
SHA1db6f8988af46b56216a6f0daf95ab8c9bdb57400
SHA256fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba
SHA512720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3
-
Filesize
748KB
MD5d604a165826a3df124f663479b0607b5
SHA1f3afcb70f500c2dcdb2fc0edd6869c31b43dc792
SHA2561001065dcc00ff8d14c2166940a2936b1ff78c3cffa17eb75b502a2a9a932a2c
SHA51200f0c02b13fd7806cd8664b5278b3a21785f8dd8871655d7af24794c46a0c39514648d25f33d1b33b7967dd3bec0882051205d26decc12a10f2a6a54589a9ebf
-
Filesize
301KB
MD51075f5bdeae2dae8ed0be96c0772cbde
SHA105e761c27139288d04cbf222c6d711fa8b907e75
SHA25642f3493aa0a0a755f92f7773838ddf19d9f7f93ac64eaf2e85f7ea36e16e14ed
SHA512267bae9e05e32c1be45f688ade0d2beb895f415bf156927fc42aaee7f51a5fb4ef8c815f9153c7bd46f38329338b1e6f790f5e7c6775a7a88a3399b09d04ca05