Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 11:02
Behavioral task
behavioral1
Sample
JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe
-
Size
658KB
-
MD5
79526f842921845d1f40f311b5fdbc18
-
SHA1
4fc2a651e68b4619d1bc8ef14618c5115d7820ac
-
SHA256
fa3ea17ebf293967c60e2104e9f0d93f3e71b13ccf7101b9ff49ecd021ea2b32
-
SHA512
2b34405caa76f57158747cf1989c8dcf9822d3a1a4cb45a5cb5fa8e8c684999db2d63081124361e7668a41571c5cfd37f7d2403ed4606bab1aa21d801cde6ccc
-
SSDEEP
12288:o9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hw:cZ1xuVVjfFoynPaVBUR8f+kN10EBC
Malware Config
Extracted
darkcomet
Guest16
79.117.209.23:1604
DC_MUTEX-DFGNDRE
-
gencode
3iaD1lZ2xpHe
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeSecurityPrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeTakeOwnershipPrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeLoadDriverPrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeSystemProfilePrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeSystemtimePrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeProfSingleProcessPrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeIncBasePriorityPrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeCreatePagefilePrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeBackupPrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeRestorePrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeShutdownPrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeDebugPrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeSystemEnvironmentPrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeChangeNotifyPrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeRemoteShutdownPrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeUndockPrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeManageVolumePrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeImpersonatePrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: SeCreateGlobalPrivilege 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: 33 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: 34 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: 35 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe Token: 36 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2820 JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_79526f842921845d1f40f311b5fdbc18.exe"1⤵
- Modifies firewall policy service
- Windows security bypass
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2820