Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 06:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe
-
Size
952KB
-
MD5
6ac89fb4812f7ba559fcab082396ebc0
-
SHA1
08da024af3efb045e0d6e445b28ea523d99a2858
-
SHA256
6d38e7a65af4f43681045cd8687e21eb3178976334e86e7fd66d83e9b95b08ad
-
SHA512
4099883d096eec47921c09df9742790216a463937c4570e8c0ee45c3550f6ae342986ca6c4d1ba7183b5183176c67a8e6791fd01d846fe64ca042eaec3d50b19
-
SSDEEP
12288:byyy7Z3z4I8NXOGjwwG/ZjXsAHHz79p9NM5Tz103j2CF4TxQUOfhVPOSAE//VAci:baCI2OewFJN4mkxyHnnew1SatLRzD
Malware Config
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 3352 micoffice.exe 2312 micoffice.exe 2864 micoffice.exe -
Loads dropped DLL 7 IoCs
pid Process 3120 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 3120 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 3120 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 3120 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 3120 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 3352 micoffice.exe 3352 micoffice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\msoffice = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftOffice\\micoffice.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2420 set thread context of 3120 2420 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 30 PID 3352 set thread context of 2312 3352 micoffice.exe 35 PID 3352 set thread context of 2864 3352 micoffice.exe 36 -
resource yara_rule behavioral1/memory/3120-449-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2312-940-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3120-1040-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2312-1044-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2864 micoffice.exe Token: SeSecurityPrivilege 2864 micoffice.exe Token: SeTakeOwnershipPrivilege 2864 micoffice.exe Token: SeLoadDriverPrivilege 2864 micoffice.exe Token: SeSystemProfilePrivilege 2864 micoffice.exe Token: SeSystemtimePrivilege 2864 micoffice.exe Token: SeProfSingleProcessPrivilege 2864 micoffice.exe Token: SeIncBasePriorityPrivilege 2864 micoffice.exe Token: SeCreatePagefilePrivilege 2864 micoffice.exe Token: SeBackupPrivilege 2864 micoffice.exe Token: SeRestorePrivilege 2864 micoffice.exe Token: SeShutdownPrivilege 2864 micoffice.exe Token: SeDebugPrivilege 2864 micoffice.exe Token: SeSystemEnvironmentPrivilege 2864 micoffice.exe Token: SeChangeNotifyPrivilege 2864 micoffice.exe Token: SeRemoteShutdownPrivilege 2864 micoffice.exe Token: SeUndockPrivilege 2864 micoffice.exe Token: SeManageVolumePrivilege 2864 micoffice.exe Token: SeImpersonatePrivilege 2864 micoffice.exe Token: SeCreateGlobalPrivilege 2864 micoffice.exe Token: 33 2864 micoffice.exe Token: 34 2864 micoffice.exe Token: 35 2864 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe Token: SeDebugPrivilege 2312 micoffice.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2420 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 3120 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 3352 micoffice.exe 2312 micoffice.exe 2864 micoffice.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2420 wrote to memory of 3120 2420 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 30 PID 2420 wrote to memory of 3120 2420 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 30 PID 2420 wrote to memory of 3120 2420 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 30 PID 2420 wrote to memory of 3120 2420 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 30 PID 2420 wrote to memory of 3120 2420 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 30 PID 2420 wrote to memory of 3120 2420 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 30 PID 2420 wrote to memory of 3120 2420 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 30 PID 2420 wrote to memory of 3120 2420 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 30 PID 3120 wrote to memory of 3276 3120 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 31 PID 3120 wrote to memory of 3276 3120 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 31 PID 3120 wrote to memory of 3276 3120 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 31 PID 3120 wrote to memory of 3276 3120 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 31 PID 3276 wrote to memory of 3328 3276 cmd.exe 33 PID 3276 wrote to memory of 3328 3276 cmd.exe 33 PID 3276 wrote to memory of 3328 3276 cmd.exe 33 PID 3276 wrote to memory of 3328 3276 cmd.exe 33 PID 3120 wrote to memory of 3352 3120 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 34 PID 3120 wrote to memory of 3352 3120 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 34 PID 3120 wrote to memory of 3352 3120 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 34 PID 3120 wrote to memory of 3352 3120 JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe 34 PID 3352 wrote to memory of 2312 3352 micoffice.exe 35 PID 3352 wrote to memory of 2312 3352 micoffice.exe 35 PID 3352 wrote to memory of 2312 3352 micoffice.exe 35 PID 3352 wrote to memory of 2312 3352 micoffice.exe 35 PID 3352 wrote to memory of 2312 3352 micoffice.exe 35 PID 3352 wrote to memory of 2312 3352 micoffice.exe 35 PID 3352 wrote to memory of 2312 3352 micoffice.exe 35 PID 3352 wrote to memory of 2312 3352 micoffice.exe 35 PID 3352 wrote to memory of 2864 3352 micoffice.exe 36 PID 3352 wrote to memory of 2864 3352 micoffice.exe 36 PID 3352 wrote to memory of 2864 3352 micoffice.exe 36 PID 3352 wrote to memory of 2864 3352 micoffice.exe 36 PID 3352 wrote to memory of 2864 3352 micoffice.exe 36 PID 3352 wrote to memory of 2864 3352 micoffice.exe 36 PID 3352 wrote to memory of 2864 3352 micoffice.exe 36 PID 3352 wrote to memory of 2864 3352 micoffice.exe 36 PID 3352 wrote to memory of 2864 3352 micoffice.exe 36 PID 3352 wrote to memory of 2864 3352 micoffice.exe 36 PID 3352 wrote to memory of 2864 3352 micoffice.exe 36 PID 3352 wrote to memory of 2864 3352 micoffice.exe 36 PID 3352 wrote to memory of 2864 3352 micoffice.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ac89fb4812f7ba559fcab082396ebc0.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SECGB.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "msoffice" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3328
-
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155B
MD5f07b93136766adced3c6f0d74d869da0
SHA1787c530f33687d758b41295e01d7a9a1bba3a467
SHA256cd603067047c028fe12d4b099d13b3681dd698d25bc32474184e9d8edd3ed701
SHA512050105a5f14939a37f653421b24959cc90cb082b20df5bb1a81335fd0ad5e70c740b43f1d6df0fc7324551425894668acc3af0c533c7d90ff149d84e844c2d10
-
Filesize
952KB
MD55bac2292d588e63eb11acb0770ae01f4
SHA13d46a734d6dd16c0eba1517a987c13717047d16d
SHA256993793585ab5675c91cc1dc060e67f15b927937e1e21bd48305649190b660475
SHA51276ffeece7404b422161f61be966199c88c7b0d73e0fb1443733f411f9849280053dc00e78f30348465519a18b68a29ac0e37ae67b812670d415af46949552893