Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2025, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe
-
Size
302KB
-
MD5
b0c0b4a1913c57d54e3c06ba148838f3
-
SHA1
778e7cab50fbea1e9cd011d57af6fd879ecfee13
-
SHA256
18dbc083f5602407dfe76b2d2649895ccd786af4a3068506d54463b3faaa15e0
-
SHA512
91c59bf0084b44313338bce55aa7a24532eb4c697e6696712880e32f54652a4d99cd8b15364e9c7a5ba5834b9631460a2c12eaaa8e680d85736b4fbbf6a0aaac
-
SSDEEP
6144:kMmdZk09v+8MGSl9P/75ggARi+UF5SGUc7lGZpeBBi8dPIJGeZwIY3s9KTUcEMsg:kMJ09v+8sLPf0oDUcphIPqjqqxJSs
Malware Config
Extracted
darkcomet
Test
runescapeman500.no-ip.org:123
DC_MUTEX-3RZSAWA
-
gencode
QHQQNJbtSqQQ
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation InteliTrace.exe -
Executes dropped EXE 2 IoCs
pid Process 1616 InteliTrace.exe 1148 SearchFillterHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\InteliTrace.exe" InteliTrace.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 432 set thread context of 3884 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 97 PID 1148 set thread context of 4292 1148 SearchFillterHost.exe 102 -
resource yara_rule behavioral2/memory/3884-9-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3884-10-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3884-11-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3884-13-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3884-12-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3884-15-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3884-16-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InteliTrace.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SearchFillterHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 1616 InteliTrace.exe 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe Token: SeIncreaseQuotaPrivilege 3884 AppLaunch.exe Token: SeSecurityPrivilege 3884 AppLaunch.exe Token: SeTakeOwnershipPrivilege 3884 AppLaunch.exe Token: SeLoadDriverPrivilege 3884 AppLaunch.exe Token: SeSystemProfilePrivilege 3884 AppLaunch.exe Token: SeSystemtimePrivilege 3884 AppLaunch.exe Token: SeProfSingleProcessPrivilege 3884 AppLaunch.exe Token: SeIncBasePriorityPrivilege 3884 AppLaunch.exe Token: SeCreatePagefilePrivilege 3884 AppLaunch.exe Token: SeBackupPrivilege 3884 AppLaunch.exe Token: SeRestorePrivilege 3884 AppLaunch.exe Token: SeShutdownPrivilege 3884 AppLaunch.exe Token: SeDebugPrivilege 3884 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 3884 AppLaunch.exe Token: SeChangeNotifyPrivilege 3884 AppLaunch.exe Token: SeRemoteShutdownPrivilege 3884 AppLaunch.exe Token: SeUndockPrivilege 3884 AppLaunch.exe Token: SeManageVolumePrivilege 3884 AppLaunch.exe Token: SeImpersonatePrivilege 3884 AppLaunch.exe Token: SeCreateGlobalPrivilege 3884 AppLaunch.exe Token: 33 3884 AppLaunch.exe Token: 34 3884 AppLaunch.exe Token: 35 3884 AppLaunch.exe Token: 36 3884 AppLaunch.exe Token: SeDebugPrivilege 1616 InteliTrace.exe Token: SeDebugPrivilege 1148 SearchFillterHost.exe Token: SeIncreaseQuotaPrivilege 4292 AppLaunch.exe Token: SeSecurityPrivilege 4292 AppLaunch.exe Token: SeTakeOwnershipPrivilege 4292 AppLaunch.exe Token: SeLoadDriverPrivilege 4292 AppLaunch.exe Token: SeSystemProfilePrivilege 4292 AppLaunch.exe Token: SeSystemtimePrivilege 4292 AppLaunch.exe Token: SeProfSingleProcessPrivilege 4292 AppLaunch.exe Token: SeIncBasePriorityPrivilege 4292 AppLaunch.exe Token: SeCreatePagefilePrivilege 4292 AppLaunch.exe Token: SeBackupPrivilege 4292 AppLaunch.exe Token: SeRestorePrivilege 4292 AppLaunch.exe Token: SeShutdownPrivilege 4292 AppLaunch.exe Token: SeDebugPrivilege 4292 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 4292 AppLaunch.exe Token: SeChangeNotifyPrivilege 4292 AppLaunch.exe Token: SeRemoteShutdownPrivilege 4292 AppLaunch.exe Token: SeUndockPrivilege 4292 AppLaunch.exe Token: SeManageVolumePrivilege 4292 AppLaunch.exe Token: SeImpersonatePrivilege 4292 AppLaunch.exe Token: SeCreateGlobalPrivilege 4292 AppLaunch.exe Token: 33 4292 AppLaunch.exe Token: 34 4292 AppLaunch.exe Token: 35 4292 AppLaunch.exe Token: 36 4292 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3884 AppLaunch.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 432 wrote to memory of 3884 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 97 PID 432 wrote to memory of 3884 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 97 PID 432 wrote to memory of 3884 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 97 PID 432 wrote to memory of 3884 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 97 PID 432 wrote to memory of 3884 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 97 PID 432 wrote to memory of 3884 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 97 PID 432 wrote to memory of 3884 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 97 PID 432 wrote to memory of 3884 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 97 PID 432 wrote to memory of 1616 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 98 PID 432 wrote to memory of 1616 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 98 PID 432 wrote to memory of 1616 432 JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe 98 PID 1616 wrote to memory of 1148 1616 InteliTrace.exe 99 PID 1616 wrote to memory of 1148 1616 InteliTrace.exe 99 PID 1616 wrote to memory of 1148 1616 InteliTrace.exe 99 PID 1148 wrote to memory of 4292 1148 SearchFillterHost.exe 102 PID 1148 wrote to memory of 4292 1148 SearchFillterHost.exe 102 PID 1148 wrote to memory of 4292 1148 SearchFillterHost.exe 102 PID 1148 wrote to memory of 4292 1148 SearchFillterHost.exe 102 PID 1148 wrote to memory of 4292 1148 SearchFillterHost.exe 102 PID 1148 wrote to memory of 4292 1148 SearchFillterHost.exe 102 PID 1148 wrote to memory of 4292 1148 SearchFillterHost.exe 102 PID 1148 wrote to memory of 4292 1148 SearchFillterHost.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b0c0b4a1913c57d54e3c06ba148838f3.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3884
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\InteliTrace.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\InteliTrace.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\SearchFillterHost.exe"C:\Users\Admin\AppData\Local\Temp\SearchFillterHost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302KB
MD5b0c0b4a1913c57d54e3c06ba148838f3
SHA1778e7cab50fbea1e9cd011d57af6fd879ecfee13
SHA25618dbc083f5602407dfe76b2d2649895ccd786af4a3068506d54463b3faaa15e0
SHA51291c59bf0084b44313338bce55aa7a24532eb4c697e6696712880e32f54652a4d99cd8b15364e9c7a5ba5834b9631460a2c12eaaa8e680d85736b4fbbf6a0aaac
-
Filesize
11KB
MD582274e023841b436b2e9712a440207af
SHA1aeb58de5109e196f7ff32f6c6ca6310b1c345b76
SHA25600aaefeef165468c1d803cef232ec42ba587577c8fa0975e81add916f78960cc
SHA5125ceabbcffe9ea04084e56d51d733d99ab71b9a83585b7f8d342bf4d2a6488f82b0387fc2f472f48b77edd7f63a73c674718690bb6d3d8f1253ccb0b907477abc