Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 12:18
Behavioral task
behavioral1
Sample
f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe
-
Size
658KB
-
MD5
f3f6c8b89afd2234c8640a2efe0e4238
-
SHA1
89372af06ce60691361bee1868ad8062783acd34
-
SHA256
d6f507dbee49fe335f24d26e7af437961fbd1d302c3e2f49308139e56b0b93a1
-
SHA512
86922f09126f8b60be821a79fc8f7e3dc9ebdcd0bcb594889bba54d408077f2f8f78eb5ec461443c145579bfaa4758656163c661e0a90cf276ca3a3f8b6e1b4f
-
SSDEEP
12288:q9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hC:mZ1xuVVjfFoynPaVBUR8f+kN10EBY
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-QS2LKT0
-
gencode
C6V8Cu0QbGy0
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeSecurityPrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeSystemtimePrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeBackupPrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeRestorePrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeShutdownPrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeDebugPrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeUndockPrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeManageVolumePrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeImpersonatePrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: 33 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: 34 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe Token: 35 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2236 f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3f6c8b89afd2234c8640a2efe0e4238_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2236