Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 15:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe
-
Size
765KB
-
MD5
7a7168d18cf94852a2578f547e266562
-
SHA1
aefef4ccb0c2803385e7c13a625b99fa029f32cb
-
SHA256
2a0726f1a3d0f5c3e3e84ccfa1dd947a2aba787e98674952507d9801de680348
-
SHA512
2c1be8f04af75e8aca5c8328e3d17369028355cbe61f5cac83854b83190f93b8981a547fb78de8b28981246c017527d88fbf9f915b94bd293f3e93b8edc296af
-
SSDEEP
12288:D/yNKIEKuBH/WX3VObB725u/SioKG87CvA76VRB+/5i4gPeAIEylo43xu:LBlZ+nVOt7Ku/zkA+LBm1AQxu
Malware Config
Extracted
darkcomet
Guest16
t0rkz60.zapto.org:1604
DC_MUTEX-3XFKE7L
-
gencode
JKhfdZjs1vQG
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe -
Disables Task Manager via registry modification
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2644 set thread context of 2768 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language applaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2636 REG.exe 2728 REG.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2768 applaunch.exe Token: SeSecurityPrivilege 2768 applaunch.exe Token: SeTakeOwnershipPrivilege 2768 applaunch.exe Token: SeLoadDriverPrivilege 2768 applaunch.exe Token: SeSystemProfilePrivilege 2768 applaunch.exe Token: SeSystemtimePrivilege 2768 applaunch.exe Token: SeProfSingleProcessPrivilege 2768 applaunch.exe Token: SeIncBasePriorityPrivilege 2768 applaunch.exe Token: SeCreatePagefilePrivilege 2768 applaunch.exe Token: SeBackupPrivilege 2768 applaunch.exe Token: SeRestorePrivilege 2768 applaunch.exe Token: SeShutdownPrivilege 2768 applaunch.exe Token: SeDebugPrivilege 2768 applaunch.exe Token: SeSystemEnvironmentPrivilege 2768 applaunch.exe Token: SeChangeNotifyPrivilege 2768 applaunch.exe Token: SeRemoteShutdownPrivilege 2768 applaunch.exe Token: SeUndockPrivilege 2768 applaunch.exe Token: SeManageVolumePrivilege 2768 applaunch.exe Token: SeImpersonatePrivilege 2768 applaunch.exe Token: SeCreateGlobalPrivilege 2768 applaunch.exe Token: 33 2768 applaunch.exe Token: 34 2768 applaunch.exe Token: 35 2768 applaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2768 applaunch.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2768 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 30 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 30 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 30 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 30 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 30 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 30 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 30 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 30 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 30 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 30 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 30 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 30 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 30 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 30 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 30 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 30 PID 2644 wrote to memory of 2748 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 31 PID 2644 wrote to memory of 2748 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 31 PID 2644 wrote to memory of 2748 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 31 PID 2644 wrote to memory of 2748 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 31 PID 2644 wrote to memory of 2728 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 32 PID 2644 wrote to memory of 2728 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 32 PID 2644 wrote to memory of 2728 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 32 PID 2644 wrote to memory of 2728 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 32 PID 2644 wrote to memory of 2636 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 33 PID 2644 wrote to memory of 2636 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 33 PID 2644 wrote to memory of 2636 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 33 PID 2644 wrote to memory of 2636 2644 JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a7168d18cf94852a2578f547e266562.exe"1⤵
- Disables RegEdit via registry modification
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\applaunch.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2768
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\VYYdC.vbs"2⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoControlPanel /t REG_DWORD /d 0 /f2⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2728
-
-
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 1 /f2⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398B
MD5bd95cdea8e757f6d5d6d0accd42844bd
SHA17785e8dce62a4532f2723a87896ae0b04f0684da
SHA25634ee7225aa0f355e6d1cfe6dafba963be1a12039a972366bf9c8df10f9fd7283
SHA5125201a90237ea5752c128629128d0f1d550a138854b529fba9a85879e5c6b5f9051b79af83dfa0686862ee3b82110c017b1edf96a780e80dcbb5ae46845f548be