Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 06:25
Behavioral task
behavioral1
Sample
JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe
-
Size
511KB
-
MD5
6334ff192eab8570d7309b9116a8b995
-
SHA1
c356ffcb58e1739bee3dc7ce45b41a195621912b
-
SHA256
0c411ca4bc46fdab13e4f2afcc3b6eb65989d7ba92786cb033b6c98956688fd1
-
SHA512
8061170cafc423e5de511d33f9eec42d99faf036b2f2ba8a7c5fb11835637d70c5714b0bcb1406221a013cdcad1647ff0f32ca45406e99efab9712044ff22cac
-
SSDEEP
12288:SBcdKoORknLPthaVpl0nOGFQu6b5K+SMoS:SiygvaynFQpN
Malware Config
Signatures
-
Darkcomet family
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe -
Executes dropped EXE 3 IoCs
pid Process 5052 svchost.exe 3356 svchost.exe 628 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5052 set thread context of 3356 5052 svchost.exe 88 PID 5052 set thread context of 628 5052 svchost.exe 89 -
resource yara_rule behavioral2/memory/4884-0-0x0000000000400000-0x0000000000A1C000-memory.dmp upx behavioral2/files/0x000c000000023ba4-11.dat upx behavioral2/memory/4884-19-0x0000000000400000-0x0000000000A1C000-memory.dmp upx behavioral2/memory/3356-22-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/628-30-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/628-35-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3356-33-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-39-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-42-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-41-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-40-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-38-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/5052-37-0x0000000000400000-0x0000000000A1C000-memory.dmp upx behavioral2/memory/628-34-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/628-29-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/628-26-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3356-25-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-43-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/628-44-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3356-45-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-47-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-48-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-50-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-52-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-54-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-56-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-58-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-60-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-62-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-64-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-66-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-68-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-70-0x0000000000400000-0x00000000004C6000-memory.dmp upx behavioral2/memory/3356-72-0x0000000000400000-0x00000000004C6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier svchost.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier svchost.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 628 svchost.exe Token: SeIncreaseQuotaPrivilege 3356 svchost.exe Token: SeSecurityPrivilege 3356 svchost.exe Token: SeTakeOwnershipPrivilege 3356 svchost.exe Token: SeLoadDriverPrivilege 3356 svchost.exe Token: SeSystemProfilePrivilege 3356 svchost.exe Token: SeSystemtimePrivilege 3356 svchost.exe Token: SeProfSingleProcessPrivilege 3356 svchost.exe Token: SeIncBasePriorityPrivilege 3356 svchost.exe Token: SeCreatePagefilePrivilege 3356 svchost.exe Token: SeBackupPrivilege 3356 svchost.exe Token: SeRestorePrivilege 3356 svchost.exe Token: SeShutdownPrivilege 3356 svchost.exe Token: SeDebugPrivilege 3356 svchost.exe Token: SeSystemEnvironmentPrivilege 3356 svchost.exe Token: SeChangeNotifyPrivilege 3356 svchost.exe Token: SeRemoteShutdownPrivilege 3356 svchost.exe Token: SeUndockPrivilege 3356 svchost.exe Token: SeManageVolumePrivilege 3356 svchost.exe Token: SeImpersonatePrivilege 3356 svchost.exe Token: SeCreateGlobalPrivilege 3356 svchost.exe Token: 33 3356 svchost.exe Token: 34 3356 svchost.exe Token: 35 3356 svchost.exe Token: 36 3356 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4884 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 5052 svchost.exe 628 svchost.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4884 wrote to memory of 2284 4884 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 83 PID 4884 wrote to memory of 2284 4884 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 83 PID 4884 wrote to memory of 2284 4884 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 83 PID 2284 wrote to memory of 3584 2284 cmd.exe 86 PID 2284 wrote to memory of 3584 2284 cmd.exe 86 PID 2284 wrote to memory of 3584 2284 cmd.exe 86 PID 4884 wrote to memory of 5052 4884 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 87 PID 4884 wrote to memory of 5052 4884 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 87 PID 4884 wrote to memory of 5052 4884 JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe 87 PID 5052 wrote to memory of 3356 5052 svchost.exe 88 PID 5052 wrote to memory of 3356 5052 svchost.exe 88 PID 5052 wrote to memory of 3356 5052 svchost.exe 88 PID 5052 wrote to memory of 3356 5052 svchost.exe 88 PID 5052 wrote to memory of 3356 5052 svchost.exe 88 PID 5052 wrote to memory of 3356 5052 svchost.exe 88 PID 5052 wrote to memory of 3356 5052 svchost.exe 88 PID 5052 wrote to memory of 3356 5052 svchost.exe 88 PID 5052 wrote to memory of 628 5052 svchost.exe 89 PID 5052 wrote to memory of 628 5052 svchost.exe 89 PID 5052 wrote to memory of 628 5052 svchost.exe 89 PID 5052 wrote to memory of 628 5052 svchost.exe 89 PID 5052 wrote to memory of 628 5052 svchost.exe 89 PID 5052 wrote to memory of 628 5052 svchost.exe 89 PID 5052 wrote to memory of 628 5052 svchost.exe 89 PID 5052 wrote to memory of 628 5052 svchost.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6334ff192eab8570d7309b9116a8b995.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VQPKJ.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Microsoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3584
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exeFalse3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exeFalse3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146B
MD560eba03d74f7eac1d650999ec2940e21
SHA1b5e699a498f09744ddebc977e6e0cab78d9f7f6d
SHA256fa1733d13decc3d951eaf692e2bde628744cfd3c7442600cd879f5079879c2de
SHA512292006ad0e611dcc283de03ee9a70879690d88d9ccd00bfdfd0d357b0e582969737a90405a4eee685a44077e9ac8a3e559f35b04a275bc1dbbce8603cb7296ef
-
Filesize
511KB
MD56334ff192eab8570d7309b9116a8b995
SHA1c356ffcb58e1739bee3dc7ce45b41a195621912b
SHA2560c411ca4bc46fdab13e4f2afcc3b6eb65989d7ba92786cb033b6c98956688fd1
SHA5128061170cafc423e5de511d33f9eec42d99faf036b2f2ba8a7c5fb11835637d70c5714b0bcb1406221a013cdcad1647ff0f32ca45406e99efab9712044ff22cac