Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 12:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe
-
Size
542KB
-
MD5
6c9cd2ac3054887bb594424d4869cfda
-
SHA1
7973c8d27ba2a38f80261fb99b988d608986e0c0
-
SHA256
2746393bac3d91352de667262c740964ba3b4a36481bf1c229bcdf16ae804eb1
-
SHA512
1cb6b4b1d3959ab1d4834f50b2974e624190986d18b77cfdcfcdf4f884e1fec61dd64e67335917319ccf534184eb73877b7e7f21c43c527dbda262f43ff439e0
-
SSDEEP
12288:IPtk6jP8Gw9OHhBZtqliSdBb2cFQfK0rKQ:IPtkUx8OBiiSdBbmf7K
Malware Config
Extracted
darkcomet
Guest16_min
rawaz.no-ip.biz:1604
DCMIN_MUTEX-05QLF3E
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
nKzbvZtX7gLR
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
DarkComet RAT
Signatures
-
Darkcomet family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\IE Per-User Initialization utility = "C:\\Users\\Admin\\AppData\\Local\\JavaUpdater.exe /b" JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2536 set thread context of 5032 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 83 PID 2536 set thread context of 0 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2536 wrote to memory of 5032 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 83 PID 2536 wrote to memory of 5032 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 83 PID 2536 wrote to memory of 5032 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 83 PID 2536 wrote to memory of 5032 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 83 PID 2536 wrote to memory of 5032 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 83 PID 2536 wrote to memory of 5032 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 83 PID 2536 wrote to memory of 5032 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 83 PID 2536 wrote to memory of 5032 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 83 PID 2536 wrote to memory of 5032 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 83 PID 2536 wrote to memory of 5032 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 83 PID 2536 wrote to memory of 5032 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 83 PID 2536 wrote to memory of 5032 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 83 PID 2536 wrote to memory of 5032 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 83 PID 2536 wrote to memory of 5032 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 83 PID 2536 wrote to memory of 4476 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 84 PID 2536 wrote to memory of 4476 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 84 PID 2536 wrote to memory of 4476 2536 JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c9cd2ac3054887bb594424d4869cfda.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"2⤵PID:5032
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"2⤵PID:4476
-