Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
submitted
07/02/2025, 03:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe
-
Size
812KB
-
MD5
b24e6fa5bc8eb2fe91c4642c92333766
-
SHA1
df93fa651cb093539c9936048a06c1baa22fd1f5
-
SHA256
dd3d5c699274454e1c3f23bea633a3823fbe5c99f739270d34ddc80e1f9a70e2
-
SHA512
4d85201281cc785a0892d20589aa440a039d7a9c3102e3fc0c7cbed0e7aacfa95fdb68ceadcd581b842b3fc5e40159bf556032eaa36476f6ce769ba511b60e4c
-
SSDEEP
24576:/4ertC/5MhG4GynfJ0CEKwvyMLn0BL1HI/uJye:/4epG5iLJRoKHTZHkuAe
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-F54S21D
-
gencode
K6G#hds5n�hD
-
install
false
-
offline_keylogger
false
-
persistence
false
Signatures
-
Darkcomet family
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2020 set thread context of 2704 2020 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 30 PID 2704 set thread context of 2260 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 31 PID 2260 set thread context of 2816 2260 explorer.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeSecurityPrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeTakeOwnershipPrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeLoadDriverPrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeSystemProfilePrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeSystemtimePrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeProfSingleProcessPrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeIncBasePriorityPrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeCreatePagefilePrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeBackupPrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeRestorePrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeShutdownPrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeDebugPrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeSystemEnvironmentPrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeChangeNotifyPrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeRemoteShutdownPrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeUndockPrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeManageVolumePrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeImpersonatePrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: SeCreateGlobalPrivilege 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: 33 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: 34 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe Token: 35 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2020 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 2260 explorer.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2704 2020 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 30 PID 2020 wrote to memory of 2704 2020 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 30 PID 2020 wrote to memory of 2704 2020 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 30 PID 2020 wrote to memory of 2704 2020 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 30 PID 2020 wrote to memory of 2704 2020 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 30 PID 2020 wrote to memory of 2704 2020 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 30 PID 2020 wrote to memory of 2704 2020 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 30 PID 2020 wrote to memory of 2704 2020 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 30 PID 2020 wrote to memory of 2704 2020 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 30 PID 2020 wrote to memory of 2704 2020 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 30 PID 2020 wrote to memory of 2704 2020 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 30 PID 2020 wrote to memory of 2704 2020 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 30 PID 2020 wrote to memory of 2704 2020 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 30 PID 2020 wrote to memory of 2704 2020 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 30 PID 2020 wrote to memory of 2704 2020 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 30 PID 2704 wrote to memory of 2260 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 31 PID 2704 wrote to memory of 2260 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 31 PID 2704 wrote to memory of 2260 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 31 PID 2704 wrote to memory of 2260 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 31 PID 2704 wrote to memory of 2260 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 31 PID 2704 wrote to memory of 2260 2704 JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe 31 PID 2260 wrote to memory of 2816 2260 explorer.exe 32 PID 2260 wrote to memory of 2816 2260 explorer.exe 32 PID 2260 wrote to memory of 2816 2260 explorer.exe 32 PID 2260 wrote to memory of 2816 2260 explorer.exe 32 PID 2260 wrote to memory of 2816 2260 explorer.exe 32 PID 2260 wrote to memory of 2816 2260 explorer.exe 32 PID 2260 wrote to memory of 2816 2260 explorer.exe 32 PID 2260 wrote to memory of 2816 2260 explorer.exe 32 PID 2260 wrote to memory of 2816 2260 explorer.exe 32 PID 2260 wrote to memory of 2816 2260 explorer.exe 32 PID 2260 wrote to memory of 2816 2260 explorer.exe 32 PID 2260 wrote to memory of 2816 2260 explorer.exe 32 PID 2260 wrote to memory of 2816 2260 explorer.exe 32 PID 2260 wrote to memory of 2816 2260 explorer.exe 32 PID 2260 wrote to memory of 2816 2260 explorer.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b24e6fa5bc8eb2fe91c4642c92333766.exe2⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵PID:2816
-
-
-