Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 06:25
Behavioral task
behavioral1
Sample
JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe
-
Size
511KB
-
MD5
6334ff192eab8570d7309b9116a8b995
-
SHA1
c356ffcb58e1739bee3dc7ce45b41a195621912b
-
SHA256
0c411ca4bc46fdab13e4f2afcc3b6eb65989d7ba92786cb033b6c98956688fd1
-
SHA512
8061170cafc423e5de511d33f9eec42d99faf036b2f2ba8a7c5fb11835637d70c5714b0bcb1406221a013cdcad1647ff0f32ca45406e99efab9712044ff22cac
-
SSDEEP
12288:SBcdKoORknLPthaVpl0nOGFQu6b5K+SMoS:SiygvaynFQpN
Malware Config
Signatures
-
Darkcomet family
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 2804 svchost.exe 2556 svchost.exe 3000 svchost.exe -
Loads dropped DLL 6 IoCs
pid Process 2428 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 2428 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 2428 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 2428 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 2428 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 2804 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2804 set thread context of 2556 2804 svchost.exe 34 PID 2804 set thread context of 3000 2804 svchost.exe 35 -
resource yara_rule behavioral1/memory/2428-0-0x0000000000400000-0x0000000000A1C000-memory.dmp upx behavioral1/files/0x000b000000012255-20.dat upx behavioral1/memory/2428-42-0x0000000000400000-0x0000000000A1C000-memory.dmp upx behavioral1/memory/2556-48-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-46-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-58-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/3000-55-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/3000-54-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/3000-53-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2804-51-0x0000000000400000-0x0000000000A1C000-memory.dmp upx behavioral1/memory/2556-59-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-60-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-62-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-61-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-63-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/3000-65-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2556-64-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-66-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-68-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-70-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-72-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-74-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-76-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-78-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-80-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-82-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-84-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-86-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-88-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral1/memory/2556-90-0x0000000000400000-0x00000000004C6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier svchost.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier svchost.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3000 svchost.exe Token: SeIncreaseQuotaPrivilege 2556 svchost.exe Token: SeSecurityPrivilege 2556 svchost.exe Token: SeTakeOwnershipPrivilege 2556 svchost.exe Token: SeLoadDriverPrivilege 2556 svchost.exe Token: SeSystemProfilePrivilege 2556 svchost.exe Token: SeSystemtimePrivilege 2556 svchost.exe Token: SeProfSingleProcessPrivilege 2556 svchost.exe Token: SeIncBasePriorityPrivilege 2556 svchost.exe Token: SeCreatePagefilePrivilege 2556 svchost.exe Token: SeBackupPrivilege 2556 svchost.exe Token: SeRestorePrivilege 2556 svchost.exe Token: SeShutdownPrivilege 2556 svchost.exe Token: SeDebugPrivilege 2556 svchost.exe Token: SeSystemEnvironmentPrivilege 2556 svchost.exe Token: SeChangeNotifyPrivilege 2556 svchost.exe Token: SeRemoteShutdownPrivilege 2556 svchost.exe Token: SeUndockPrivilege 2556 svchost.exe Token: SeManageVolumePrivilege 2556 svchost.exe Token: SeImpersonatePrivilege 2556 svchost.exe Token: SeCreateGlobalPrivilege 2556 svchost.exe Token: 33 2556 svchost.exe Token: 34 2556 svchost.exe Token: 35 2556 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2428 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 2804 svchost.exe 3000 svchost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2796 2428 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 30 PID 2428 wrote to memory of 2796 2428 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 30 PID 2428 wrote to memory of 2796 2428 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 30 PID 2428 wrote to memory of 2796 2428 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 30 PID 2796 wrote to memory of 2512 2796 cmd.exe 32 PID 2796 wrote to memory of 2512 2796 cmd.exe 32 PID 2796 wrote to memory of 2512 2796 cmd.exe 32 PID 2796 wrote to memory of 2512 2796 cmd.exe 32 PID 2428 wrote to memory of 2804 2428 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 33 PID 2428 wrote to memory of 2804 2428 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 33 PID 2428 wrote to memory of 2804 2428 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 33 PID 2428 wrote to memory of 2804 2428 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 33 PID 2804 wrote to memory of 2556 2804 svchost.exe 34 PID 2804 wrote to memory of 2556 2804 svchost.exe 34 PID 2804 wrote to memory of 2556 2804 svchost.exe 34 PID 2804 wrote to memory of 2556 2804 svchost.exe 34 PID 2804 wrote to memory of 2556 2804 svchost.exe 34 PID 2804 wrote to memory of 2556 2804 svchost.exe 34 PID 2804 wrote to memory of 2556 2804 svchost.exe 34 PID 2804 wrote to memory of 2556 2804 svchost.exe 34 PID 2804 wrote to memory of 2556 2804 svchost.exe 34 PID 2804 wrote to memory of 3000 2804 svchost.exe 35 PID 2804 wrote to memory of 3000 2804 svchost.exe 35 PID 2804 wrote to memory of 3000 2804 svchost.exe 35 PID 2804 wrote to memory of 3000 2804 svchost.exe 35 PID 2804 wrote to memory of 3000 2804 svchost.exe 35 PID 2804 wrote to memory of 3000 2804 svchost.exe 35 PID 2804 wrote to memory of 3000 2804 svchost.exe 35 PID 2804 wrote to memory of 3000 2804 svchost.exe 35 PID 2804 wrote to memory of 3000 2804 svchost.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\NlXGs.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Microsoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2512
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exeFalse3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exeFalse3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3000
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146B
MD560eba03d74f7eac1d650999ec2940e21
SHA1b5e699a498f09744ddebc977e6e0cab78d9f7f6d
SHA256fa1733d13decc3d951eaf692e2bde628744cfd3c7442600cd879f5079879c2de
SHA512292006ad0e611dcc283de03ee9a70879690d88d9ccd00bfdfd0d357b0e582969737a90405a4eee685a44077e9ac8a3e559f35b04a275bc1dbbce8603cb7296ef
-
Filesize
511KB
MD56334ff192eab8570d7309b9116a8b995
SHA1c356ffcb58e1739bee3dc7ce45b41a195621912b
SHA2560c411ca4bc46fdab13e4f2afcc3b6eb65989d7ba92786cb033b6c98956688fd1
SHA5128061170cafc423e5de511d33f9eec42d99faf036b2f2ba8a7c5fb11835637d70c5714b0bcb1406221a013cdcad1647ff0f32ca45406e99efab9712044ff22cac