Analysis
-
max time kernel
26s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 04:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_778ac94fecec690eac086869f95ac060.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_778ac94fecec690eac086869f95ac060.exe
-
Size
367KB
-
MD5
778ac94fecec690eac086869f95ac060
-
SHA1
fec50d4a5959d350961002edfb7b005b6fb73a67
-
SHA256
b537be5941e9414487320ddeb7f4589b0344a2925ea10bc87307978ea8504430
-
SHA512
a7693ec4767c5e217db492a109b5be1cb382b4da8f702f29a22b6eee75f05af26f90fe7594b63d938c4a2105f36a373553dff5ed169082c8018392ce04d1137b
-
SSDEEP
6144:05liXNmkGGAV9s8jL2/J5X+veGTHa34/ReWwrjpc6t3Y3Eh4o53q:03idmkoq/J5uvNHa3SRRqe3EhrVq
Malware Config
Extracted
darkcomet
Uncrypted
11live.zapto.org:1604
DC_MUTEX-8TVG4U4
-
gencode
fm1JDL6aD0oR
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 2 IoCs
pid Process 3048 mscormmc.exe 2648 sbscmp10.exe -
Loads dropped DLL 3 IoCs
pid Process 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\mscormmc.exe" mscormmc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1032 set thread context of 3032 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 30 -
resource yara_rule behavioral1/memory/3032-10-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3032-16-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3032-15-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3032-12-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3032-19-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3032-17-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3032-22-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3032-21-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3032-20-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3032-32-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3032-33-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3032-37-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscormmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sbscmp10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_778ac94fecec690eac086869f95ac060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 3048 mscormmc.exe 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe Token: SeDebugPrivilege 3048 mscormmc.exe Token: SeIncreaseQuotaPrivilege 3032 AppLaunch.exe Token: SeSecurityPrivilege 3032 AppLaunch.exe Token: SeTakeOwnershipPrivilege 3032 AppLaunch.exe Token: SeLoadDriverPrivilege 3032 AppLaunch.exe Token: SeSystemProfilePrivilege 3032 AppLaunch.exe Token: SeSystemtimePrivilege 3032 AppLaunch.exe Token: SeProfSingleProcessPrivilege 3032 AppLaunch.exe Token: SeIncBasePriorityPrivilege 3032 AppLaunch.exe Token: SeCreatePagefilePrivilege 3032 AppLaunch.exe Token: SeBackupPrivilege 3032 AppLaunch.exe Token: SeRestorePrivilege 3032 AppLaunch.exe Token: SeShutdownPrivilege 3032 AppLaunch.exe Token: SeDebugPrivilege 3032 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 3032 AppLaunch.exe Token: SeChangeNotifyPrivilege 3032 AppLaunch.exe Token: SeRemoteShutdownPrivilege 3032 AppLaunch.exe Token: SeUndockPrivilege 3032 AppLaunch.exe Token: SeManageVolumePrivilege 3032 AppLaunch.exe Token: SeImpersonatePrivilege 3032 AppLaunch.exe Token: SeCreateGlobalPrivilege 3032 AppLaunch.exe Token: 33 3032 AppLaunch.exe Token: 34 3032 AppLaunch.exe Token: 35 3032 AppLaunch.exe Token: SeDebugPrivilege 2648 sbscmp10.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3032 AppLaunch.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1032 wrote to memory of 3032 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 30 PID 1032 wrote to memory of 3032 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 30 PID 1032 wrote to memory of 3032 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 30 PID 1032 wrote to memory of 3032 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 30 PID 1032 wrote to memory of 3032 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 30 PID 1032 wrote to memory of 3032 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 30 PID 1032 wrote to memory of 3032 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 30 PID 1032 wrote to memory of 3032 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 30 PID 1032 wrote to memory of 3032 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 30 PID 1032 wrote to memory of 3032 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 30 PID 1032 wrote to memory of 3032 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 30 PID 1032 wrote to memory of 3048 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 31 PID 1032 wrote to memory of 3048 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 31 PID 1032 wrote to memory of 3048 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 31 PID 1032 wrote to memory of 3048 1032 JaffaCakes118_778ac94fecec690eac086869f95ac060.exe 31 PID 3048 wrote to memory of 2648 3048 mscormmc.exe 32 PID 3048 wrote to memory of 2648 3048 mscormmc.exe 32 PID 3048 wrote to memory of 2648 3048 mscormmc.exe 32 PID 3048 wrote to memory of 2648 3048 mscormmc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_778ac94fecec690eac086869f95ac060.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_778ac94fecec690eac086869f95ac060.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\mscormmc.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\mscormmc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\sbscmp10.exe"C:\Users\Admin\AppData\Local\Temp\sbscmp10.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe4⤵PID:2492
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5427b0b82ecfa40c76e2e30e00b4bf184
SHA12a86f7013bc045dc1ce0226a987525f3c761b382
SHA2563acdece7fa9b00287d23e76569db64447d2c22687053e9975767696f1f4e26aa
SHA512162282a546cb7a6331744940b11af21857ae7c13632f3abe25a9188ca24d663f396da84bc0fbc3257af79f614cff4e5fdd346442a536a4bb0417d9921faa7c6f
-
Filesize
367KB
MD5778ac94fecec690eac086869f95ac060
SHA1fec50d4a5959d350961002edfb7b005b6fb73a67
SHA256b537be5941e9414487320ddeb7f4589b0344a2925ea10bc87307978ea8504430
SHA512a7693ec4767c5e217db492a109b5be1cb382b4da8f702f29a22b6eee75f05af26f90fe7594b63d938c4a2105f36a373553dff5ed169082c8018392ce04d1137b