Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 03:21
Static task
static1
Behavioral task
behavioral1
Sample
dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe
-
Size
304KB
-
MD5
dfb218edd9631dbf712d1667131f8114
-
SHA1
06b5e317a8ff1bddbb509becc45f4014c71c04ca
-
SHA256
28199b9441679f82b096fbafa934bdcbaf4ce58524249242db6e8c1f021e0902
-
SHA512
f3c582c942c9fb5527d9b733a264d3cec233c652e30befce0882eae2edfdc2fe45c114042683c59383af0c012bc03888fdb9edf431c6baa14489c2cfccf26552
-
SSDEEP
6144:wgDEKyC00xuqvXRaunYx1wR2pD0qdgYRO3n5Xq7XV+79Awws:wggKyC3kpunswRyFe5mY71j
Malware Config
Extracted
darkcomet
Guest16
dafuq1337.no-ip.info:1604
DC_MUTEX-6FKRREY
-
gencode
3vBDzRHaiK2J
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation audiadg.exe -
Executes dropped EXE 2 IoCs
pid Process 4088 audiadg.exe 3972 bcdprov.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\audiadg.exe" audiadg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2180 set thread context of 3144 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 99 PID 3972 set thread context of 4576 3972 bcdprov.exe 104 -
resource yara_rule behavioral2/memory/3144-9-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3144-10-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3144-11-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3144-13-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3144-12-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3144-16-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3144-15-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language audiadg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcdprov.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 4088 audiadg.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 3144 AppLaunch.exe Token: SeSecurityPrivilege 3144 AppLaunch.exe Token: SeTakeOwnershipPrivilege 3144 AppLaunch.exe Token: SeLoadDriverPrivilege 3144 AppLaunch.exe Token: SeSystemProfilePrivilege 3144 AppLaunch.exe Token: SeSystemtimePrivilege 3144 AppLaunch.exe Token: SeProfSingleProcessPrivilege 3144 AppLaunch.exe Token: SeIncBasePriorityPrivilege 3144 AppLaunch.exe Token: SeCreatePagefilePrivilege 3144 AppLaunch.exe Token: SeBackupPrivilege 3144 AppLaunch.exe Token: SeRestorePrivilege 3144 AppLaunch.exe Token: SeShutdownPrivilege 3144 AppLaunch.exe Token: SeDebugPrivilege 3144 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 3144 AppLaunch.exe Token: SeChangeNotifyPrivilege 3144 AppLaunch.exe Token: SeRemoteShutdownPrivilege 3144 AppLaunch.exe Token: SeUndockPrivilege 3144 AppLaunch.exe Token: SeManageVolumePrivilege 3144 AppLaunch.exe Token: SeImpersonatePrivilege 3144 AppLaunch.exe Token: SeCreateGlobalPrivilege 3144 AppLaunch.exe Token: 33 3144 AppLaunch.exe Token: 34 3144 AppLaunch.exe Token: 35 3144 AppLaunch.exe Token: 36 3144 AppLaunch.exe Token: SeDebugPrivilege 4088 audiadg.exe Token: SeDebugPrivilege 3972 bcdprov.exe Token: SeIncreaseQuotaPrivilege 4576 AppLaunch.exe Token: SeSecurityPrivilege 4576 AppLaunch.exe Token: SeTakeOwnershipPrivilege 4576 AppLaunch.exe Token: SeLoadDriverPrivilege 4576 AppLaunch.exe Token: SeSystemProfilePrivilege 4576 AppLaunch.exe Token: SeSystemtimePrivilege 4576 AppLaunch.exe Token: SeProfSingleProcessPrivilege 4576 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4576 AppLaunch.exe Token: SeCreatePagefilePrivilege 4576 AppLaunch.exe Token: SeBackupPrivilege 4576 AppLaunch.exe Token: SeRestorePrivilege 4576 AppLaunch.exe Token: SeShutdownPrivilege 4576 AppLaunch.exe Token: SeDebugPrivilege 4576 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 4576 AppLaunch.exe Token: SeChangeNotifyPrivilege 4576 AppLaunch.exe Token: SeRemoteShutdownPrivilege 4576 AppLaunch.exe Token: SeUndockPrivilege 4576 AppLaunch.exe Token: SeManageVolumePrivilege 4576 AppLaunch.exe Token: SeImpersonatePrivilege 4576 AppLaunch.exe Token: SeCreateGlobalPrivilege 4576 AppLaunch.exe Token: 33 4576 AppLaunch.exe Token: 34 4576 AppLaunch.exe Token: 35 4576 AppLaunch.exe Token: 36 4576 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3144 AppLaunch.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2180 wrote to memory of 3144 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 99 PID 2180 wrote to memory of 3144 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 99 PID 2180 wrote to memory of 3144 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 99 PID 2180 wrote to memory of 3144 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 99 PID 2180 wrote to memory of 3144 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 99 PID 2180 wrote to memory of 3144 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 99 PID 2180 wrote to memory of 3144 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 99 PID 2180 wrote to memory of 3144 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 99 PID 2180 wrote to memory of 4088 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 101 PID 2180 wrote to memory of 4088 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 101 PID 2180 wrote to memory of 4088 2180 dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe 101 PID 4088 wrote to memory of 3972 4088 audiadg.exe 102 PID 4088 wrote to memory of 3972 4088 audiadg.exe 102 PID 4088 wrote to memory of 3972 4088 audiadg.exe 102 PID 3972 wrote to memory of 4576 3972 bcdprov.exe 104 PID 3972 wrote to memory of 4576 3972 bcdprov.exe 104 PID 3972 wrote to memory of 4576 3972 bcdprov.exe 104 PID 3972 wrote to memory of 4576 3972 bcdprov.exe 104 PID 3972 wrote to memory of 4576 3972 bcdprov.exe 104 PID 3972 wrote to memory of 4576 3972 bcdprov.exe 104 PID 3972 wrote to memory of 4576 3972 bcdprov.exe 104 PID 3972 wrote to memory of 4576 3972 bcdprov.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dfb218edd9631dbf712d1667131f8114_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3144
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\audiadg.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\audiadg.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\bcdprov.exe"C:\Users\Admin\AppData\Local\Temp\bcdprov.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD5dfb218edd9631dbf712d1667131f8114
SHA106b5e317a8ff1bddbb509becc45f4014c71c04ca
SHA25628199b9441679f82b096fbafa934bdcbaf4ce58524249242db6e8c1f021e0902
SHA512f3c582c942c9fb5527d9b733a264d3cec233c652e30befce0882eae2edfdc2fe45c114042683c59383af0c012bc03888fdb9edf431c6baa14489c2cfccf26552
-
Filesize
11KB
MD563a5156000f70073577d224d0790ff7c
SHA1512bef8d3a3dc1d1c5688ebeb7b80a0f419c2962
SHA256dbba15708cb33190adfec5a9b39a95ad8ea89fd2a159946d0608790d015e2f6a
SHA5125d36709f1297cd258ca252fc1e9058543e7166c177b6050202ab1eb25dda3d67485277525a4ff352292d1950836145c370112c3d41c2f6d472b2f4a179c9fd42