Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2025, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe
-
Size
854KB
-
MD5
bc9a5b89f91f37a2d2a605c98745eb07
-
SHA1
7f6894fad9ab377dca25e44607ea23451384e7b0
-
SHA256
a3a8bf9a082e1825db80e7df1e6aebf289328cd4bcbd719f8d6da6b9686a6883
-
SHA512
232c9f81e90aa6ceac059391056160520229af60a703a2fa830e524645fa09d14fc632d8916adfa352f3209f5a7a70a7a05f8f1d12e3bfe01061d3f4877a4c55
-
SSDEEP
12288:lrrPfHyTJIoVzp5B+C35gTqqzXcJYN45iqLSnX+vIdBd1NXvrqvtg0O9B4M9DJ:l/4WgwoC/sJo45iq+yIZ1NfeVg0gBl
Malware Config
Extracted
darkcomet
Guest16
kaank11.zapto.org:15963
DC_MUTEX-B22UUWY
-
InstallPath
Windupdt\JavaSun.exe
-
gencode
x-tEbBWdArpJ
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
JavaSun
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windupdt\\JavaSun.exe" JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 56 1396 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000\Control Panel\International\Geo\Nation JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe -
Executes dropped EXE 2 IoCs
pid Process 4244 JavaSun.exe 3880 JavaSun.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3311063739-2594902809-44604183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JavaSun = "C:\\Windupdt\\JavaSun.exe" JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3484 set thread context of 1204 3484 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 86 PID 4244 set thread context of 3880 4244 JavaSun.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JavaSun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JavaSun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2056 MicrosoftEdgeUpdate.exe 1608 cmd.exe 5096 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5096 PING.EXE -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeSecurityPrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeTakeOwnershipPrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeLoadDriverPrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeSystemProfilePrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeSystemtimePrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeProfSingleProcessPrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeIncBasePriorityPrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeCreatePagefilePrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeBackupPrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeRestorePrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeShutdownPrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeDebugPrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeSystemEnvironmentPrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeChangeNotifyPrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeRemoteShutdownPrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeUndockPrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeManageVolumePrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeImpersonatePrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeCreateGlobalPrivilege 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: 33 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: 34 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: 35 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: 36 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe Token: SeIncreaseQuotaPrivilege 3880 JavaSun.exe Token: SeSecurityPrivilege 3880 JavaSun.exe Token: SeTakeOwnershipPrivilege 3880 JavaSun.exe Token: SeLoadDriverPrivilege 3880 JavaSun.exe Token: SeSystemProfilePrivilege 3880 JavaSun.exe Token: SeSystemtimePrivilege 3880 JavaSun.exe Token: SeProfSingleProcessPrivilege 3880 JavaSun.exe Token: SeIncBasePriorityPrivilege 3880 JavaSun.exe Token: SeCreatePagefilePrivilege 3880 JavaSun.exe Token: SeBackupPrivilege 3880 JavaSun.exe Token: SeRestorePrivilege 3880 JavaSun.exe Token: SeShutdownPrivilege 3880 JavaSun.exe Token: SeDebugPrivilege 3880 JavaSun.exe Token: SeSystemEnvironmentPrivilege 3880 JavaSun.exe Token: SeChangeNotifyPrivilege 3880 JavaSun.exe Token: SeRemoteShutdownPrivilege 3880 JavaSun.exe Token: SeUndockPrivilege 3880 JavaSun.exe Token: SeManageVolumePrivilege 3880 JavaSun.exe Token: SeImpersonatePrivilege 3880 JavaSun.exe Token: SeCreateGlobalPrivilege 3880 JavaSun.exe Token: 33 3880 JavaSun.exe Token: 34 3880 JavaSun.exe Token: 35 3880 JavaSun.exe Token: 36 3880 JavaSun.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3484 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 3484 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 4244 JavaSun.exe 4244 JavaSun.exe 3880 JavaSun.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 3484 wrote to memory of 1204 3484 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 86 PID 3484 wrote to memory of 1204 3484 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 86 PID 3484 wrote to memory of 1204 3484 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 86 PID 3484 wrote to memory of 1204 3484 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 86 PID 3484 wrote to memory of 1204 3484 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 86 PID 3484 wrote to memory of 1204 3484 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 86 PID 3484 wrote to memory of 1204 3484 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 86 PID 3484 wrote to memory of 1204 3484 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 86 PID 3484 wrote to memory of 1204 3484 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 86 PID 3484 wrote to memory of 1204 3484 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 86 PID 3484 wrote to memory of 1204 3484 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 86 PID 3484 wrote to memory of 1204 3484 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 86 PID 3484 wrote to memory of 1204 3484 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 86 PID 3484 wrote to memory of 1204 3484 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 86 PID 1204 wrote to memory of 4244 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 92 PID 1204 wrote to memory of 4244 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 92 PID 1204 wrote to memory of 4244 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 92 PID 1204 wrote to memory of 1608 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 93 PID 1204 wrote to memory of 1608 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 93 PID 1204 wrote to memory of 1608 1204 JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe 93 PID 4244 wrote to memory of 3880 4244 JavaSun.exe 95 PID 4244 wrote to memory of 3880 4244 JavaSun.exe 95 PID 4244 wrote to memory of 3880 4244 JavaSun.exe 95 PID 4244 wrote to memory of 3880 4244 JavaSun.exe 95 PID 4244 wrote to memory of 3880 4244 JavaSun.exe 95 PID 4244 wrote to memory of 3880 4244 JavaSun.exe 95 PID 4244 wrote to memory of 3880 4244 JavaSun.exe 95 PID 4244 wrote to memory of 3880 4244 JavaSun.exe 95 PID 4244 wrote to memory of 3880 4244 JavaSun.exe 95 PID 4244 wrote to memory of 3880 4244 JavaSun.exe 95 PID 4244 wrote to memory of 3880 4244 JavaSun.exe 95 PID 4244 wrote to memory of 3880 4244 JavaSun.exe 95 PID 4244 wrote to memory of 3880 4244 JavaSun.exe 95 PID 4244 wrote to memory of 3880 4244 JavaSun.exe 95 PID 1608 wrote to memory of 5096 1608 cmd.exe 96 PID 1608 wrote to memory of 5096 1608 cmd.exe 96 PID 1608 wrote to memory of 5096 1608 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windupdt\JavaSun.exe"C:\Windupdt\JavaSun.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windupdt\JavaSun.exe"C:\Windupdt\JavaSun.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3880
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc9a5b89f91f37a2d2a605c98745eb07.exe"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 54⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5096
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5ODUiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODQ0NDQzNjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0NjkwMjg4MTU5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2056
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3311063739-2594902809-44604183-1000\699c4b9cdebca7aaea5193cae8a50098_e82d6890-6286-4aa4-b40c-0ede4d70d32c
Filesize50B
MD55b63d4dd8c04c88c0e30e494ec6a609a
SHA1884d5a8bdc25fe794dc22ef9518009dcf0069d09
SHA2564d93c22555b3169e5c13716ca59b8b22892c69b3025aea841afe5259698102fd
SHA51215ff8551ac6b9de978050569bcdc26f44dfc06a0eaf445ac70fd45453a21bdafa3e4c8b4857d6a1c3226f4102a639682bdfb71d7b255062fb81a51c9126896cb
-
Filesize
854KB
MD5bc9a5b89f91f37a2d2a605c98745eb07
SHA17f6894fad9ab377dca25e44607ea23451384e7b0
SHA256a3a8bf9a082e1825db80e7df1e6aebf289328cd4bcbd719f8d6da6b9686a6883
SHA512232c9f81e90aa6ceac059391056160520229af60a703a2fa830e524645fa09d14fc632d8916adfa352f3209f5a7a70a7a05f8f1d12e3bfe01061d3f4877a4c55