Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 22:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe
-
Size
952KB
-
MD5
68aefa5292d0ac8e6d9a9c67b434fbb0
-
SHA1
0640e2a13590930c100714eb854e5621036397d3
-
SHA256
876a33b5e9204ee3913158102264f33ad6fe1edd5db9a007efeddf0b8b66e8c7
-
SHA512
1577823114d06db22faa2241c2b02642ea71bc13be0d7b1b70c7a5b7a9face1f8d696e42fda70392867a7a124c939f72af2e9fbb3e4bf2d5f9ec559b8df6b668
-
SSDEEP
12288:byyy7Z3z4I8NXOGjwwG/ZjXsAHHz79p9NM5Tz103j2CF4TxQUOfhVPOSAE//VAci:baCI2OewFJN4mkxyHnnew1SatLRzD
Malware Config
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 2604 micoffice.exe 1980 micoffice.exe 1620 micoffice.exe -
Loads dropped DLL 5 IoCs
pid Process 2984 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 2984 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 2984 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 2984 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 2984 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\msoffice = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftOffice\\micoffice.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1804 set thread context of 2984 1804 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 30 PID 2604 set thread context of 1980 2604 micoffice.exe 35 PID 2604 set thread context of 1620 2604 micoffice.exe 36 -
resource yara_rule behavioral1/memory/2984-445-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2984-1037-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1980-1043-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1620 micoffice.exe Token: SeSecurityPrivilege 1620 micoffice.exe Token: SeTakeOwnershipPrivilege 1620 micoffice.exe Token: SeLoadDriverPrivilege 1620 micoffice.exe Token: SeSystemProfilePrivilege 1620 micoffice.exe Token: SeSystemtimePrivilege 1620 micoffice.exe Token: SeProfSingleProcessPrivilege 1620 micoffice.exe Token: SeIncBasePriorityPrivilege 1620 micoffice.exe Token: SeCreatePagefilePrivilege 1620 micoffice.exe Token: SeBackupPrivilege 1620 micoffice.exe Token: SeRestorePrivilege 1620 micoffice.exe Token: SeShutdownPrivilege 1620 micoffice.exe Token: SeDebugPrivilege 1620 micoffice.exe Token: SeSystemEnvironmentPrivilege 1620 micoffice.exe Token: SeChangeNotifyPrivilege 1620 micoffice.exe Token: SeRemoteShutdownPrivilege 1620 micoffice.exe Token: SeUndockPrivilege 1620 micoffice.exe Token: SeManageVolumePrivilege 1620 micoffice.exe Token: SeImpersonatePrivilege 1620 micoffice.exe Token: SeCreateGlobalPrivilege 1620 micoffice.exe Token: 33 1620 micoffice.exe Token: 34 1620 micoffice.exe Token: 35 1620 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe Token: SeDebugPrivilege 1980 micoffice.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1804 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 2984 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 2604 micoffice.exe 1980 micoffice.exe 1620 micoffice.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2984 1804 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 30 PID 1804 wrote to memory of 2984 1804 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 30 PID 1804 wrote to memory of 2984 1804 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 30 PID 1804 wrote to memory of 2984 1804 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 30 PID 1804 wrote to memory of 2984 1804 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 30 PID 1804 wrote to memory of 2984 1804 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 30 PID 1804 wrote to memory of 2984 1804 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 30 PID 1804 wrote to memory of 2984 1804 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 30 PID 2984 wrote to memory of 2492 2984 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 31 PID 2984 wrote to memory of 2492 2984 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 31 PID 2984 wrote to memory of 2492 2984 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 31 PID 2984 wrote to memory of 2492 2984 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 31 PID 2492 wrote to memory of 2364 2492 cmd.exe 33 PID 2492 wrote to memory of 2364 2492 cmd.exe 33 PID 2492 wrote to memory of 2364 2492 cmd.exe 33 PID 2492 wrote to memory of 2364 2492 cmd.exe 33 PID 2984 wrote to memory of 2604 2984 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 34 PID 2984 wrote to memory of 2604 2984 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 34 PID 2984 wrote to memory of 2604 2984 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 34 PID 2984 wrote to memory of 2604 2984 JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe 34 PID 2604 wrote to memory of 1980 2604 micoffice.exe 35 PID 2604 wrote to memory of 1980 2604 micoffice.exe 35 PID 2604 wrote to memory of 1980 2604 micoffice.exe 35 PID 2604 wrote to memory of 1980 2604 micoffice.exe 35 PID 2604 wrote to memory of 1980 2604 micoffice.exe 35 PID 2604 wrote to memory of 1980 2604 micoffice.exe 35 PID 2604 wrote to memory of 1980 2604 micoffice.exe 35 PID 2604 wrote to memory of 1980 2604 micoffice.exe 35 PID 2604 wrote to memory of 1620 2604 micoffice.exe 36 PID 2604 wrote to memory of 1620 2604 micoffice.exe 36 PID 2604 wrote to memory of 1620 2604 micoffice.exe 36 PID 2604 wrote to memory of 1620 2604 micoffice.exe 36 PID 2604 wrote to memory of 1620 2604 micoffice.exe 36 PID 2604 wrote to memory of 1620 2604 micoffice.exe 36 PID 2604 wrote to memory of 1620 2604 micoffice.exe 36 PID 2604 wrote to memory of 1620 2604 micoffice.exe 36 PID 2604 wrote to memory of 1620 2604 micoffice.exe 36 PID 2604 wrote to memory of 1620 2604 micoffice.exe 36 PID 2604 wrote to memory of 1620 2604 micoffice.exe 36 PID 2604 wrote to memory of 1620 2604 micoffice.exe 36 PID 2604 wrote to memory of 1620 2604 micoffice.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_68aefa5292d0ac8e6d9a9c67b434fbb0.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OTFDH.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "msoffice" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2364
-
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1980
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1620
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155B
MD5f07b93136766adced3c6f0d74d869da0
SHA1787c530f33687d758b41295e01d7a9a1bba3a467
SHA256cd603067047c028fe12d4b099d13b3681dd698d25bc32474184e9d8edd3ed701
SHA512050105a5f14939a37f653421b24959cc90cb082b20df5bb1a81335fd0ad5e70c740b43f1d6df0fc7324551425894668acc3af0c533c7d90ff149d84e844c2d10
-
Filesize
952KB
MD56d949163f01eb8b8d32bc3c7a9cb64ae
SHA193361a58817657e3e6e3edc6f8ac4b558159a6b4
SHA256424cffc4a59ed22389445dc00c6ac8dcf87b131e652e5daf4781aec8d46776c9
SHA5125deb3dcc056f84807ac7b701b6d4eac4f463fd50748b8af421ec28112fd1300dd29958b119676fbc4abe7f119d5af3c357ea7a77c1820cd60cf17eebeac07d29