Analysis
-
max time kernel
82s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 00:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe
-
Size
679KB
-
MD5
76820646e34735e5c96dc6a213721e3e
-
SHA1
a686538a25ddbd0bd80034ccee2e2e81d16e8bf3
-
SHA256
e350b3b114a4de8395368a5a333ce71a2037aaa9685eae8f0c946c2d461e5f9f
-
SHA512
5ee7dbd8f9e1aa1b68fe5005d35a6e7a1ec064da1baf695a8459660a5d49943acf7d208be2646dd2d8a7a20b0fe57932db33484e87b7ea28180a46dbaff01f7b
-
SSDEEP
12288:24av+00DAsSQvZ+6pocqQIcyvjSiyjRCmCwrLD+BEsK4HY9YNVzYKj86syB05Nl:24ZDAGv/ocqQIVjyjTrL6uCvNpYOcl
Malware Config
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windupdt\\winupdate.exe" JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2616 attrib.exe -
Deletes itself 1 IoCs
pid Process 1872 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2632 winupdate.exe 2944 winupdate.exe -
Loads dropped DLL 8 IoCs
pid Process 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 2632 winupdate.exe 2632 winupdate.exe 2632 winupdate.exe 2632 winupdate.exe 2944 winupdate.exe 2944 winupdate.exe 2944 winupdate.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" winupdate.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe File opened for modification \??\PhysicalDrive0 winupdate.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2664 set thread context of 2832 2664 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 30 PID 2632 set thread context of 2944 2632 winupdate.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 264 PING.EXE 1872 cmd.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" winupdate.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 264 PING.EXE -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeSecurityPrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeTakeOwnershipPrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeLoadDriverPrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeSystemProfilePrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeSystemtimePrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeProfSingleProcessPrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeIncBasePriorityPrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeCreatePagefilePrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeBackupPrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeRestorePrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeShutdownPrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeDebugPrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeSystemEnvironmentPrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeChangeNotifyPrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeRemoteShutdownPrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeUndockPrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeManageVolumePrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeImpersonatePrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeCreateGlobalPrivilege 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: 33 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: 34 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: 35 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe Token: SeIncreaseQuotaPrivilege 2944 winupdate.exe Token: SeSecurityPrivilege 2944 winupdate.exe Token: SeTakeOwnershipPrivilege 2944 winupdate.exe Token: SeLoadDriverPrivilege 2944 winupdate.exe Token: SeSystemProfilePrivilege 2944 winupdate.exe Token: SeSystemtimePrivilege 2944 winupdate.exe Token: SeProfSingleProcessPrivilege 2944 winupdate.exe Token: SeIncBasePriorityPrivilege 2944 winupdate.exe Token: SeCreatePagefilePrivilege 2944 winupdate.exe Token: SeBackupPrivilege 2944 winupdate.exe Token: SeRestorePrivilege 2944 winupdate.exe Token: SeShutdownPrivilege 2944 winupdate.exe Token: SeDebugPrivilege 2944 winupdate.exe Token: SeSystemEnvironmentPrivilege 2944 winupdate.exe Token: SeChangeNotifyPrivilege 2944 winupdate.exe Token: SeRemoteShutdownPrivilege 2944 winupdate.exe Token: SeUndockPrivilege 2944 winupdate.exe Token: SeManageVolumePrivilege 2944 winupdate.exe Token: SeImpersonatePrivilege 2944 winupdate.exe Token: SeCreateGlobalPrivilege 2944 winupdate.exe Token: 33 2944 winupdate.exe Token: 34 2944 winupdate.exe Token: 35 2944 winupdate.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2664 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 2632 winupdate.exe 2944 winupdate.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2832 2664 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 30 PID 2664 wrote to memory of 2832 2664 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 30 PID 2664 wrote to memory of 2832 2664 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 30 PID 2664 wrote to memory of 2832 2664 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 30 PID 2664 wrote to memory of 2832 2664 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 30 PID 2664 wrote to memory of 2832 2664 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 30 PID 2664 wrote to memory of 2832 2664 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 30 PID 2664 wrote to memory of 2832 2664 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 30 PID 2664 wrote to memory of 2832 2664 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 30 PID 2664 wrote to memory of 2832 2664 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 30 PID 2664 wrote to memory of 2832 2664 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 30 PID 2664 wrote to memory of 2832 2664 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 30 PID 2664 wrote to memory of 2832 2664 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 30 PID 2664 wrote to memory of 2832 2664 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 30 PID 2664 wrote to memory of 2832 2664 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 30 PID 2832 wrote to memory of 2572 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 31 PID 2832 wrote to memory of 2572 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 31 PID 2832 wrote to memory of 2572 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 31 PID 2832 wrote to memory of 2572 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 31 PID 2832 wrote to memory of 2632 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 33 PID 2832 wrote to memory of 2632 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 33 PID 2832 wrote to memory of 2632 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 33 PID 2832 wrote to memory of 2632 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 33 PID 2832 wrote to memory of 2632 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 33 PID 2832 wrote to memory of 2632 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 33 PID 2832 wrote to memory of 2632 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 33 PID 2832 wrote to memory of 1872 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 34 PID 2832 wrote to memory of 1872 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 34 PID 2832 wrote to memory of 1872 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 34 PID 2832 wrote to memory of 1872 2832 JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe 34 PID 2572 wrote to memory of 2616 2572 cmd.exe 35 PID 2572 wrote to memory of 2616 2572 cmd.exe 35 PID 2572 wrote to memory of 2616 2572 cmd.exe 35 PID 2572 wrote to memory of 2616 2572 cmd.exe 35 PID 1872 wrote to memory of 264 1872 cmd.exe 37 PID 1872 wrote to memory of 264 1872 cmd.exe 37 PID 1872 wrote to memory of 264 1872 cmd.exe 37 PID 1872 wrote to memory of 264 1872 cmd.exe 37 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 PID 2632 wrote to memory of 2944 2632 winupdate.exe 38 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2616 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2616
-
-
-
C:\Windupdt\winupdate.exe"C:\Windupdt\winupdate.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windupdt\winupdate.exe"C:\Windupdt\winupdate.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2944
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_76820646e34735e5c96dc6a213721e3e.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 54⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:264
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
679KB
MD576820646e34735e5c96dc6a213721e3e
SHA1a686538a25ddbd0bd80034ccee2e2e81d16e8bf3
SHA256e350b3b114a4de8395368a5a333ce71a2037aaa9685eae8f0c946c2d461e5f9f
SHA5125ee7dbd8f9e1aa1b68fe5005d35a6e7a1ec064da1baf695a8459660a5d49943acf7d208be2646dd2d8a7a20b0fe57932db33484e87b7ea28180a46dbaff01f7b