Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 01:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe
-
Size
6.9MB
-
MD5
696231cda2fc5e0de11c3e501e7946bf
-
SHA1
2a8112d59aacac3217b730c94aeb95b05a6e3827
-
SHA256
ea2339a4c8f45bcfd1cc45e66c7b4f1322ead21bb646db3d78f64ecae0b35b6f
-
SHA512
26adf9988194a6915e6873c971de9ec65e635ed70a3cf587d240b4223f9e603abaf6d647e5fdad69dbf16542fb53b05fe3c9008fa1cab20def49009328f2463b
-
SSDEEP
49152:IAY7oaDdNVu/OCgEGS+ef9JEMbk25zy/hd5Xv9qxsWLGWHgcxNZ5cY/n7zUcD8u7:
Malware Config
Extracted
darkcomet
Redox
reemote.no-ip.org:1604
DC_MUTEX-YWMH1RC
-
gencode
YU8YyArHoGNk
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 2 IoCs
pid Process 2820 Redox 1.2.6.13.exe 2000 winlogon.exe -
Loads dropped DLL 2 IoCs
pid Process 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\FBUpdate91 = "C:\\Users\\Admin\\AppData\\Roaming\\Acrobat\\FBUpdate91.exe" JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 2820 Redox 1.2.6.13.exe 2820 Redox 1.2.6.13.exe 2820 Redox 1.2.6.13.exe 2820 Redox 1.2.6.13.exe 2820 Redox 1.2.6.13.exe 2820 Redox 1.2.6.13.exe 2820 Redox 1.2.6.13.exe 2820 Redox 1.2.6.13.exe 2820 Redox 1.2.6.13.exe 2820 Redox 1.2.6.13.exe 2820 Redox 1.2.6.13.exe 2820 Redox 1.2.6.13.exe 2820 Redox 1.2.6.13.exe 2820 Redox 1.2.6.13.exe 2820 Redox 1.2.6.13.exe 2820 Redox 1.2.6.13.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3020 set thread context of 2000 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Redox 1.2.6.13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe Token: SeIncreaseQuotaPrivilege 2000 winlogon.exe Token: SeSecurityPrivilege 2000 winlogon.exe Token: SeTakeOwnershipPrivilege 2000 winlogon.exe Token: SeLoadDriverPrivilege 2000 winlogon.exe Token: SeSystemProfilePrivilege 2000 winlogon.exe Token: SeSystemtimePrivilege 2000 winlogon.exe Token: SeProfSingleProcessPrivilege 2000 winlogon.exe Token: SeIncBasePriorityPrivilege 2000 winlogon.exe Token: SeCreatePagefilePrivilege 2000 winlogon.exe Token: SeBackupPrivilege 2000 winlogon.exe Token: SeRestorePrivilege 2000 winlogon.exe Token: SeShutdownPrivilege 2000 winlogon.exe Token: SeDebugPrivilege 2000 winlogon.exe Token: SeSystemEnvironmentPrivilege 2000 winlogon.exe Token: SeChangeNotifyPrivilege 2000 winlogon.exe Token: SeRemoteShutdownPrivilege 2000 winlogon.exe Token: SeUndockPrivilege 2000 winlogon.exe Token: SeManageVolumePrivilege 2000 winlogon.exe Token: SeImpersonatePrivilege 2000 winlogon.exe Token: SeCreateGlobalPrivilege 2000 winlogon.exe Token: 33 2000 winlogon.exe Token: 34 2000 winlogon.exe Token: 35 2000 winlogon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2820 Redox 1.2.6.13.exe 2000 winlogon.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2820 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 31 PID 3020 wrote to memory of 2820 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 31 PID 3020 wrote to memory of 2820 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 31 PID 3020 wrote to memory of 2820 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 31 PID 3020 wrote to memory of 2000 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 32 PID 3020 wrote to memory of 2000 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 32 PID 3020 wrote to memory of 2000 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 32 PID 3020 wrote to memory of 2000 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 32 PID 3020 wrote to memory of 2000 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 32 PID 3020 wrote to memory of 2000 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 32 PID 3020 wrote to memory of 2000 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 32 PID 3020 wrote to memory of 2000 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 32 PID 3020 wrote to memory of 2000 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 32 PID 3020 wrote to memory of 2000 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 32 PID 3020 wrote to memory of 2000 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 32 PID 3020 wrote to memory of 2000 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 32 PID 3020 wrote to memory of 2000 3020 JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_696231cda2fc5e0de11c3e501e7946bf.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\Redox 1.2.6.13.exe"C:\Users\Admin\AppData\Local\Temp\Redox 1.2.6.13.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\AppLaunch\winlogon.exeC:\Users\Admin\AppData\Local\Temp\\AppLaunch\winlogon.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.6MB
MD5a7d8a5a806b462c5db56cd4568dbdafd
SHA1b0bbe844c4cf5db1a1f4f4f1292c6a046a48cbd8
SHA2562fe7371d60f8adeff9719968d41b09ce31dbfa6c7dd8e07b3eb8b09bc8ba8df7
SHA512400158cac861fe6d0837ad0f7dd651961295852d9789b499a91bec81ec2ed19da8380e73086ebd2ed6dd8e314e0f7d1b40302064348498824255a0e2598b2898
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98