Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 12:38
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe
-
Size
724KB
-
MD5
6cae0061a202f9a84975872c387eded8
-
SHA1
3282ef9ae0c219e7a9edc992d68f3be1077ad826
-
SHA256
7736e50e548acb5f83a16782393ddd17489c55162d4b81aa8c9c5d2356e04574
-
SHA512
b8a7ff5fa90718d5650eaba6da7b58ba1beba112814658ae93a8eac89eb0f048be60d71cc6ab8d1011be71c5d1ac01a60d68711f6bb01b1961fb879de275825e
-
SSDEEP
12288:oZCQ3Fdf7REeahTfqWfr39INldD2uQxc4n4eWRBhtJ6kIJnkEzJLmYJYSc:oZCQ3/7qnJSE3iXzAccWTnJ9ynkEzJqg
Malware Config
Signatures
-
Darkcomet family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_6cae0061a202f9a84975872c387eded8 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe" JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2584 set thread context of 2068 2584 JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442069788" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A96EB201-C9CF-11EF-833B-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2068 2584 JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe 31 PID 2584 wrote to memory of 2068 2584 JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe 31 PID 2584 wrote to memory of 2068 2584 JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe 31 PID 2584 wrote to memory of 2068 2584 JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe 31 PID 2584 wrote to memory of 2068 2584 JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe 31 PID 2584 wrote to memory of 2068 2584 JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe 31 PID 2584 wrote to memory of 2068 2584 JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe 31 PID 2584 wrote to memory of 2068 2584 JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe 31 PID 2584 wrote to memory of 2068 2584 JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe 31 PID 2584 wrote to memory of 2068 2584 JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe 31 PID 2584 wrote to memory of 2068 2584 JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe 31 PID 2584 wrote to memory of 2068 2584 JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe 31 PID 2068 wrote to memory of 2800 2068 iexplore.exe 32 PID 2068 wrote to memory of 2800 2068 iexplore.exe 32 PID 2068 wrote to memory of 2800 2068 iexplore.exe 32 PID 2068 wrote to memory of 2800 2068 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6cae0061a202f9a84975872c387eded8.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d7a0a95c73c190f3efc0c830340c7a9
SHA1a4a202f6ebad255b9fda295afb3829260f77867c
SHA25600e97b5eaecf7a825115a9ad6e8567f2946bad108b6e1388375e422f1d5b8d78
SHA51213bf2c2f71269102b3fc5983579b045798cc3f4e4645bc573a92839b69f4ea79dc2b959bcd4eeb1f396b2dcbe8134087a3897bbdc94b8840b792f429ef1eec2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a05b95db8eff7523752f4c638f5024
SHA1a7fb7b30b1e35a9e67dbef2ba0ca1b8b64a78403
SHA25676636a82abe6c225b52e7676a7285c81a23df27a415418e55d1f77c40ab09312
SHA512e8853cc624a261b09ca6cac5a772401c706bc5b30746fbf1e87fb3db8256fc29397da7afa7d6b9259de3d18d01ebab5d03e2e2ba52561cb320a5d731df2a6c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5220513be9806c4adf615b9222dadf7d0
SHA136c97e5c99497050242b45444413c46966fc50f9
SHA25666e1df6367d4fbdb45d514516dff47651e79033c17fe3334709d3eb90c430496
SHA512b7e597ec1a257e483668a63006f566d992397be888c857d70e9b769f84a1905cf0c7f6f133749f712678de20b65a444e07bfc15435cd0144169c29d36c68fee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5943adb455b24290ed0be701c30ed9564
SHA102b229c012658c491abae41768d6b174e915d3f0
SHA2561ec8cfb99fc693d864cfc2923b75f9bf4af892aee24af79e5b246eb0d9b01593
SHA512c84cea513b4fab1cc01be9b81c5314c961c62dc524e229e01e7e941dd27bf174da8d6c900f2ade6187df0d25f6a17becad3f73e0f6d2991bf211da3ae8763dd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59813070217934dd950a3c6be51483b8f
SHA1d95d3614b781b2357de52effaabf640917d28032
SHA256b2bfb4aa62b6445ad3a9a0a5d5fd24fc98fd88e24966c17a0b0f39dc997e2fb8
SHA51287e87e30ac59d201fc6003910af5cb8d648dbdd12a5a4eba017f3ce1fa77c08c98fd664c06fca6d66b505771a862ba26fb74a04cc32f22daa42cead7e5f8e1ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5819391151f66ea2f42b38dec11bc2513
SHA1d11cd65678e6346daa239c0d07c15b8b5a208e1e
SHA256ed1e72de3696a0a97fc73bb6be2dae4bc977c5371d8edc8b3d96a1616d49501f
SHA5129e74f221dda0cf5c726db717360372d2f9ebc9c4e7cda44202aac6e36f5efde919097e443485dc65faa594c9fdbf83390f56da1ff442f47071f022baee124106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d8f9fd921c9fe0ab9adf02bde81f29
SHA18c281003120b53b9649452acef9b633da7a76278
SHA25693363dc5956224b2695d18a27982bff3baeb5210e25ee6f114ba36c1d1f8b582
SHA5127b967cd823fa51de704bce54dbf541954e11b09e6a10778db2e7f177debfb066c494ff780f5390e719999261ce63d0b5227ce663a18718479b42b68daf4a585b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50326ac6bfbdba8203a03b61c316a7208
SHA1950ee01582d19e4c4fb44cf785b3d52b5aa428ed
SHA256f9e3c2fb73a79cac5156a56d711c9d7e9eb09d029ce69214bc3a584b3748e269
SHA51253fbbeec093162ad8dcf36fac2dda8c9a2dc8e1421d2fdd275a627a31e3498ad876ab6929d2166dfea375996326a8e764e161d33f04b4644a8312bcd01307866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f86d87481a5f0f69868d1f386120cc7f
SHA1b538b6337a34d69e93e5b002c38730e8dc509ef5
SHA25635ae355374abd7141980a4f5fa1dcec900670a0492645d1e45106799e0b7762f
SHA512e74e82f3763f6fe2b8e2b4909af41008ac8b32f65a4e77761cd81d8f04f25d9c8aac2a7bd51ea949f8850187023f07dc8a7cb4b6a138b6ef74c35be2475636e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52445514bc970c1a6c97a21f1f8e63b38
SHA1854cce348f7a63f0dc668b633b90785ae0658ac9
SHA2568dd40f070ce5577fa16040a718f22c0b255c1f90dc07e36da16a172a90b1d8cf
SHA5126748a0f5b129dae0e96644e52c6bab0276f3a051910fc11ea95d2d0a8880f7dcf58e0450f8b0f00313f6e5ed35b8affffd6d59bb07fb5864bfbaca4fc9e13152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516d085f7db7d84e82f9f70e6e8f3c8e
SHA1e8ee8f365456f5c7a917b23da769aa45318adfcf
SHA2569a9852f12744eaec5305fa04b8090bf56271c6ba73fc80f3f8a84ea6864ace1f
SHA5127e33ae8807d327b7617a6e5793e1f48da72870f2dcc2810e87a5f82c4361f1f5484c950ed7533048eb31c5c5ea9f4cb5698f35c67208e75afb007d44983f5ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9cfc909a90f73a9dd8e2181e65a0c99
SHA189b91052a911f155755cd61f18d9825a8df0458b
SHA256cde699e8cdae0deabab45ef0136546a28150d9981bb0eae79afef8ab41584ca7
SHA512bc55f011344eb07554f99c56e7884996373a994bf332cd13f70310ac9a809c1811b5cbc013cb9d685290b63783b170bb60fa7d8ed0355399a522d65c234999f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55af3d1cf5efc3cf3cfca547a03254762
SHA16683758c2d635551683caabe6590115a2b8240c1
SHA2565ccad19159eca5e200c8e2096977d5459669ab66103a82b767712d4b180d6f69
SHA512c86900c6e05161aca865c8d502b6e4c46757fbed392ff893c657d3930ad087b758d309822692cbcc5637f7a206042c4d372b125e99c5c9fdbf3273b0e75d7eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b273954557ae8eee3acbd9fb8e9859bc
SHA1b4e813b8a12f0db7cbdd2ae0a42b4e9036b13047
SHA256bd9e3aefd3c62d7cb4d8fe2b2ddb11d7fcda6e4192940c737fd8e62a870a39b0
SHA51275405e72b281f79ff80080a9816fa9b8af7df2779670649dadf373e2978959f92f8132b92574856d031f233b63468df1b2cb13582431c6b91923828cee8b847c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc0c472019f10f9895fbd2f70b0a56eb
SHA116b784444a1fa170ea3bd2ee6f4c3b54edb19b70
SHA256e474cc0cf310202fceaaa8d94a470efba75057e72c5c2f70e92333734edd10eb
SHA512ea5facb2721fb9b681577ca6b2199c5e93cb1913d0b6d0f50914a1f3c2f434534b825cdf6df1bcefdefeec47364c64d03a5739fb1f5ceec09eb31b6799adee3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b56a985713f6677869e4b83ee98f00cf
SHA1945ed588dc3c7a106894335b6ccdca0448572ddf
SHA25613d0d47bdc1613f38cb9a90cd995207075e0816ea19cb915744324626849cd38
SHA512035f095e989ed8e47b8b24f089ef78820087950979f9340b1e86621434488fb7aeb111668ce2ccf04bef4df94fda71b4031f3500e3a2b1f1bea9b27ee51b7f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53144d1405ef84b1210ac63bb437f5d09
SHA1b293bfe09688ab3bdf1181b41d4c6594edddf93c
SHA2566d0765f978b5a42d0c10e91590c0515d7d09348b1586d332af9f1cc733037148
SHA512448ed5eb3cc7fc2e356a92cac29b6d646f44b62a743bdec42f22b4fb5e6c9d44dcfce59dead36cfd3e4c741ec539720dfaef5b0a4286ea70eb008ffdde531bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542b6ff1521c4285c2fb36bccb80a46e5
SHA131f7478b4520e81384bbb24ded47b04dbf89ac3d
SHA25695505fc2b972438489aa26efa1975932a075158cc9493efb9911dff509d487c2
SHA512d8750a307a74c94cb2fb93b751bd70ea096d1af3843792d5fba15c7f6bb66d5fca7fd832b39d523ff3b80fd288861b037677fbf0d07e652b0b08e99764aad824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578b0c8ffc25bbe19912611fd83b32a25
SHA14e575333d06221b6ff3224ecf2f853dbe2453460
SHA256c132cc9c970600ec1b9ebee550a1357b84ac2698b3be824191779cb9b881d638
SHA5122f0483a23e7344b8f5e474b62138f8b1bc4ac784ec2c377e24a86a5eff4c1eb5e0d1c83dbc62fcf6760c21104f2f4af48bd66560f663ab60b3f10847aad28847
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b