Analysis
-
max time kernel
109s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/02/2025, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe
-
Size
854KB
-
MD5
bc9a5b89f91f37a2d2a605c98745eb07
-
SHA1
7f6894fad9ab377dca25e44607ea23451384e7b0
-
SHA256
a3a8bf9a082e1825db80e7df1e6aebf289328cd4bcbd719f8d6da6b9686a6883
-
SHA512
232c9f81e90aa6ceac059391056160520229af60a703a2fa830e524645fa09d14fc632d8916adfa352f3209f5a7a70a7a05f8f1d12e3bfe01061d3f4877a4c55
-
SSDEEP
12288:lrrPfHyTJIoVzp5B+C35gTqqzXcJYN45iqLSnX+vIdBd1NXvrqvtg0O9B4M9DJ:l/4WgwoC/sJo45iq+yIZ1NfeVg0gBl
Malware Config
Extracted
darkcomet
Guest16
kaank11.zapto.org:15963
DC_MUTEX-B22UUWY
-
InstallPath
Windupdt\JavaSun.exe
-
gencode
x-tEbBWdArpJ
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
JavaSun
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windupdt\\JavaSun.exe" JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe -
Deletes itself 1 IoCs
pid Process 2540 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2720 JavaSun.exe 2668 JavaSun.exe -
Loads dropped DLL 3 IoCs
pid Process 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 2720 JavaSun.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\JavaSun = "C:\\Windupdt\\JavaSun.exe" JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2092 set thread context of 2796 2092 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 30 PID 2720 set thread context of 2668 2720 JavaSun.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JavaSun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JavaSun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2540 cmd.exe 1096 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1096 PING.EXE -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeSecurityPrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeTakeOwnershipPrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeLoadDriverPrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeSystemProfilePrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeSystemtimePrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeProfSingleProcessPrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeIncBasePriorityPrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeCreatePagefilePrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeBackupPrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeRestorePrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeShutdownPrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeDebugPrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeSystemEnvironmentPrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeChangeNotifyPrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeRemoteShutdownPrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeUndockPrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeManageVolumePrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeImpersonatePrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeCreateGlobalPrivilege 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: 33 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: 34 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: 35 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeIncreaseQuotaPrivilege 2668 JavaSun.exe Token: SeSecurityPrivilege 2668 JavaSun.exe Token: SeTakeOwnershipPrivilege 2668 JavaSun.exe Token: SeLoadDriverPrivilege 2668 JavaSun.exe Token: SeSystemProfilePrivilege 2668 JavaSun.exe Token: SeSystemtimePrivilege 2668 JavaSun.exe Token: SeProfSingleProcessPrivilege 2668 JavaSun.exe Token: SeIncBasePriorityPrivilege 2668 JavaSun.exe Token: SeCreatePagefilePrivilege 2668 JavaSun.exe Token: SeBackupPrivilege 2668 JavaSun.exe Token: SeRestorePrivilege 2668 JavaSun.exe Token: SeShutdownPrivilege 2668 JavaSun.exe Token: SeDebugPrivilege 2668 JavaSun.exe Token: SeSystemEnvironmentPrivilege 2668 JavaSun.exe Token: SeChangeNotifyPrivilege 2668 JavaSun.exe Token: SeRemoteShutdownPrivilege 2668 JavaSun.exe Token: SeUndockPrivilege 2668 JavaSun.exe Token: SeManageVolumePrivilege 2668 JavaSun.exe Token: SeImpersonatePrivilege 2668 JavaSun.exe Token: SeCreateGlobalPrivilege 2668 JavaSun.exe Token: 33 2668 JavaSun.exe Token: 34 2668 JavaSun.exe Token: 35 2668 JavaSun.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2092 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 2092 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 2720 JavaSun.exe 2720 JavaSun.exe 2668 JavaSun.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2796 2092 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 30 PID 2092 wrote to memory of 2796 2092 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 30 PID 2092 wrote to memory of 2796 2092 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 30 PID 2092 wrote to memory of 2796 2092 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 30 PID 2092 wrote to memory of 2796 2092 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 30 PID 2092 wrote to memory of 2796 2092 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 30 PID 2092 wrote to memory of 2796 2092 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 30 PID 2092 wrote to memory of 2796 2092 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 30 PID 2092 wrote to memory of 2796 2092 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 30 PID 2092 wrote to memory of 2796 2092 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 30 PID 2092 wrote to memory of 2796 2092 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 30 PID 2092 wrote to memory of 2796 2092 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 30 PID 2092 wrote to memory of 2796 2092 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 30 PID 2796 wrote to memory of 2720 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 31 PID 2796 wrote to memory of 2720 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 31 PID 2796 wrote to memory of 2720 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 31 PID 2796 wrote to memory of 2720 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 31 PID 2796 wrote to memory of 2540 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 32 PID 2796 wrote to memory of 2540 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 32 PID 2796 wrote to memory of 2540 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 32 PID 2796 wrote to memory of 2540 2796 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 32 PID 2720 wrote to memory of 2668 2720 JavaSun.exe 33 PID 2720 wrote to memory of 2668 2720 JavaSun.exe 33 PID 2720 wrote to memory of 2668 2720 JavaSun.exe 33 PID 2720 wrote to memory of 2668 2720 JavaSun.exe 33 PID 2720 wrote to memory of 2668 2720 JavaSun.exe 33 PID 2720 wrote to memory of 2668 2720 JavaSun.exe 33 PID 2720 wrote to memory of 2668 2720 JavaSun.exe 33 PID 2720 wrote to memory of 2668 2720 JavaSun.exe 33 PID 2720 wrote to memory of 2668 2720 JavaSun.exe 33 PID 2720 wrote to memory of 2668 2720 JavaSun.exe 33 PID 2720 wrote to memory of 2668 2720 JavaSun.exe 33 PID 2720 wrote to memory of 2668 2720 JavaSun.exe 33 PID 2720 wrote to memory of 2668 2720 JavaSun.exe 33 PID 2540 wrote to memory of 1096 2540 cmd.exe 35 PID 2540 wrote to memory of 1096 2540 cmd.exe 35 PID 2540 wrote to memory of 1096 2540 cmd.exe 35 PID 2540 wrote to memory of 1096 2540 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windupdt\JavaSun.exe"C:\Windupdt\JavaSun.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windupdt\JavaSun.exe"C:\Windupdt\JavaSun.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 54⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1096
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3063565911-2056067323-3330884624-1000\699c4b9cdebca7aaea5193cae8a50098_de87a6d6-9d44-4942-9ec6-2be31b435411
Filesize50B
MD55b63d4dd8c04c88c0e30e494ec6a609a
SHA1884d5a8bdc25fe794dc22ef9518009dcf0069d09
SHA2564d93c22555b3169e5c13716ca59b8b22892c69b3025aea841afe5259698102fd
SHA51215ff8551ac6b9de978050569bcdc26f44dfc06a0eaf445ac70fd45453a21bdafa3e4c8b4857d6a1c3226f4102a639682bdfb71d7b255062fb81a51c9126896cb
-
Filesize
854KB
MD5bc9a5b89f91f37a2d2a605c98745eb07
SHA17f6894fad9ab377dca25e44607ea23451384e7b0
SHA256a3a8bf9a082e1825db80e7df1e6aebf289328cd4bcbd719f8d6da6b9686a6883
SHA512232c9f81e90aa6ceac059391056160520229af60a703a2fa830e524645fa09d14fc632d8916adfa352f3209f5a7a70a7a05f8f1d12e3bfe01061d3f4877a4c55