Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
06/02/2025, 13:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_aba0b440dd25c7f3d8a009009a6abc25.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_aba0b440dd25c7f3d8a009009a6abc25.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_aba0b440dd25c7f3d8a009009a6abc25.exe
-
Size
680KB
-
MD5
aba0b440dd25c7f3d8a009009a6abc25
-
SHA1
f023abfa140aa9fb9a93eca3a01451df8c7442f7
-
SHA256
e3b98c6377aedde14ae5dae49e9a7ce7e6bbfc5021537317fe4c071d544999d8
-
SHA512
341b58620b95cc3f3935d43b685ba47cafbaa1e5c2537d47d84a6cc1ddb51922c547a877d7a2918a96f9ccf46911dac213b0b338b8695c85fe48eb04b53d8939
-
SSDEEP
12288:e2uoo5daSSM+f1Bf6m68tteXNBZcICMTJT7qpOxTieIiZ2/9ie2:K95dIRfPtPeXuD2TRTieB2/9/2
Malware Config
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windupdt\\winupdate.exe" Dc Server.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" explorer.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" explorer.exe -
Windows security bypass 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" explorer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Dc Server.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation JaffaCakes118_aba0b440dd25c7f3d8a009009a6abc25.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dc Server.exe JaffaCakes118_aba0b440dd25c7f3d8a009009a6abc25.exe -
Executes dropped EXE 1 IoCs
pid Process 4640 Dc Server.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" Dc Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windefender = "C:/Users/Admin/AppData/Roaming/Microsoft/Windows/Start Menu/Programs/Startup//Dc Server.exe" JaffaCakes118_aba0b440dd25c7f3d8a009009a6abc25.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4640 set thread context of 1988 4640 Dc Server.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_aba0b440dd25c7f3d8a009009a6abc25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dc Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Dc Server.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Dc Server.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Dc Server.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Dc Server.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Dc Server.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1988 explorer.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4640 Dc Server.exe Token: SeSecurityPrivilege 4640 Dc Server.exe Token: SeTakeOwnershipPrivilege 4640 Dc Server.exe Token: SeLoadDriverPrivilege 4640 Dc Server.exe Token: SeSystemProfilePrivilege 4640 Dc Server.exe Token: SeSystemtimePrivilege 4640 Dc Server.exe Token: SeProfSingleProcessPrivilege 4640 Dc Server.exe Token: SeIncBasePriorityPrivilege 4640 Dc Server.exe Token: SeCreatePagefilePrivilege 4640 Dc Server.exe Token: SeBackupPrivilege 4640 Dc Server.exe Token: SeRestorePrivilege 4640 Dc Server.exe Token: SeShutdownPrivilege 4640 Dc Server.exe Token: SeDebugPrivilege 4640 Dc Server.exe Token: SeSystemEnvironmentPrivilege 4640 Dc Server.exe Token: SeChangeNotifyPrivilege 4640 Dc Server.exe Token: SeRemoteShutdownPrivilege 4640 Dc Server.exe Token: SeUndockPrivilege 4640 Dc Server.exe Token: SeManageVolumePrivilege 4640 Dc Server.exe Token: SeImpersonatePrivilege 4640 Dc Server.exe Token: SeCreateGlobalPrivilege 4640 Dc Server.exe Token: 33 4640 Dc Server.exe Token: 34 4640 Dc Server.exe Token: 35 4640 Dc Server.exe Token: 36 4640 Dc Server.exe Token: SeIncreaseQuotaPrivilege 1988 explorer.exe Token: SeSecurityPrivilege 1988 explorer.exe Token: SeTakeOwnershipPrivilege 1988 explorer.exe Token: SeLoadDriverPrivilege 1988 explorer.exe Token: SeSystemProfilePrivilege 1988 explorer.exe Token: SeSystemtimePrivilege 1988 explorer.exe Token: SeProfSingleProcessPrivilege 1988 explorer.exe Token: SeIncBasePriorityPrivilege 1988 explorer.exe Token: SeCreatePagefilePrivilege 1988 explorer.exe Token: SeBackupPrivilege 1988 explorer.exe Token: SeRestorePrivilege 1988 explorer.exe Token: SeShutdownPrivilege 1988 explorer.exe Token: SeDebugPrivilege 1988 explorer.exe Token: SeSystemEnvironmentPrivilege 1988 explorer.exe Token: SeChangeNotifyPrivilege 1988 explorer.exe Token: SeRemoteShutdownPrivilege 1988 explorer.exe Token: SeUndockPrivilege 1988 explorer.exe Token: SeManageVolumePrivilege 1988 explorer.exe Token: SeImpersonatePrivilege 1988 explorer.exe Token: SeCreateGlobalPrivilege 1988 explorer.exe Token: 33 1988 explorer.exe Token: 34 1988 explorer.exe Token: 35 1988 explorer.exe Token: 36 1988 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1576 JaffaCakes118_aba0b440dd25c7f3d8a009009a6abc25.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1576 wrote to memory of 4640 1576 JaffaCakes118_aba0b440dd25c7f3d8a009009a6abc25.exe 86 PID 1576 wrote to memory of 4640 1576 JaffaCakes118_aba0b440dd25c7f3d8a009009a6abc25.exe 86 PID 1576 wrote to memory of 4640 1576 JaffaCakes118_aba0b440dd25c7f3d8a009009a6abc25.exe 86 PID 4640 wrote to memory of 1988 4640 Dc Server.exe 87 PID 4640 wrote to memory of 1988 4640 Dc Server.exe 87 PID 4640 wrote to memory of 1988 4640 Dc Server.exe 87 PID 4640 wrote to memory of 1988 4640 Dc Server.exe 87 PID 4640 wrote to memory of 1988 4640 Dc Server.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aba0b440dd25c7f3d8a009009a6abc25.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aba0b440dd25c7f3d8a009009a6abc25.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dc Server.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dc Server.exe"2⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
636KB
MD5bfec72c7866e52d29e86c618ed2bda9f
SHA117e0bfb97a2d7e8b9198f297b4365b8fd963ee4e
SHA256df2583f582149320f0ac91efa431a8dd25ab36b41b4e3e2225f365c44752cf94
SHA512f279ce7ea8a5a0c43c4cbc888cdc933a9545419dac9c5bd1fb7cb40d4ce14c13f6ab5d662c46cc73a157ef69956f32df41e15eeda7a79a5865d1351a9d90ca96