Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/02/2025, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe
-
Size
1.1MB
-
MD5
b25d4a1c7e3caddfd7e489d9e77389ba
-
SHA1
02abd2fcd6bdf8ece338941c4407bf362cf2e455
-
SHA256
3bb1029c0d84010dcc585e5ee1903ebf8b456b80a790109632dc8a6988f9d64a
-
SHA512
9c3aff9c2f0597a3cc2b804a756060314d08409fa1bbde4dcbbea377a3518edb5c7ba10ff2c223c20004795911e25dfa30d366006d79f69c8ba17ebee7eee42e
-
SSDEEP
12288:kCdf83r0wfmRTTcCChotw/lKR5U+194aLS/gu9cyx0a8+RYNaFWi7e4iL64cc66i:c0Q6JlZA+CthKNSVgx+WZc
Malware Config
Extracted
darkcomet
Guest16
sophieinseva.no-ip.org:1500
DC_MUTEX-F54S21D
-
gencode
Um25sWL8RPAf
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 2 IoCs
pid Process 2772 interpolice.exe 2600 interpolice.exe -
Loads dropped DLL 3 IoCs
pid Process 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\interpolice = "C:\\Users\\Admin\\AppData\\Roaming\\Livejasmin ACL.exe" JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\interpolice = "C:\\Users\\Admin\\AppData\\Roaming\\Livejasmin ACL.exe" JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2400 set thread context of 2772 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 31 PID 2380 set thread context of 2600 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language interpolice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language interpolice.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe Token: SeDebugPrivilege 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe Token: SeIncreaseQuotaPrivilege 2772 interpolice.exe Token: SeSecurityPrivilege 2772 interpolice.exe Token: SeTakeOwnershipPrivilege 2772 interpolice.exe Token: SeLoadDriverPrivilege 2772 interpolice.exe Token: SeSystemProfilePrivilege 2772 interpolice.exe Token: SeSystemtimePrivilege 2772 interpolice.exe Token: SeProfSingleProcessPrivilege 2772 interpolice.exe Token: SeIncBasePriorityPrivilege 2772 interpolice.exe Token: SeCreatePagefilePrivilege 2772 interpolice.exe Token: SeBackupPrivilege 2772 interpolice.exe Token: SeRestorePrivilege 2772 interpolice.exe Token: SeShutdownPrivilege 2772 interpolice.exe Token: SeDebugPrivilege 2772 interpolice.exe Token: SeSystemEnvironmentPrivilege 2772 interpolice.exe Token: SeChangeNotifyPrivilege 2772 interpolice.exe Token: SeRemoteShutdownPrivilege 2772 interpolice.exe Token: SeUndockPrivilege 2772 interpolice.exe Token: SeManageVolumePrivilege 2772 interpolice.exe Token: SeImpersonatePrivilege 2772 interpolice.exe Token: SeCreateGlobalPrivilege 2772 interpolice.exe Token: 33 2772 interpolice.exe Token: 34 2772 interpolice.exe Token: 35 2772 interpolice.exe Token: SeIncreaseQuotaPrivilege 2600 interpolice.exe Token: SeSecurityPrivilege 2600 interpolice.exe Token: SeTakeOwnershipPrivilege 2600 interpolice.exe Token: SeLoadDriverPrivilege 2600 interpolice.exe Token: SeSystemProfilePrivilege 2600 interpolice.exe Token: SeSystemtimePrivilege 2600 interpolice.exe Token: SeProfSingleProcessPrivilege 2600 interpolice.exe Token: SeIncBasePriorityPrivilege 2600 interpolice.exe Token: SeCreatePagefilePrivilege 2600 interpolice.exe Token: SeBackupPrivilege 2600 interpolice.exe Token: SeRestorePrivilege 2600 interpolice.exe Token: SeShutdownPrivilege 2600 interpolice.exe Token: SeDebugPrivilege 2600 interpolice.exe Token: SeSystemEnvironmentPrivilege 2600 interpolice.exe Token: SeChangeNotifyPrivilege 2600 interpolice.exe Token: SeRemoteShutdownPrivilege 2600 interpolice.exe Token: SeUndockPrivilege 2600 interpolice.exe Token: SeManageVolumePrivilege 2600 interpolice.exe Token: SeImpersonatePrivilege 2600 interpolice.exe Token: SeCreateGlobalPrivilege 2600 interpolice.exe Token: 33 2600 interpolice.exe Token: 34 2600 interpolice.exe Token: 35 2600 interpolice.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2772 interpolice.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2400 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 30 PID 2380 wrote to memory of 2400 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 30 PID 2380 wrote to memory of 2400 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 30 PID 2380 wrote to memory of 2400 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 30 PID 2400 wrote to memory of 2772 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 31 PID 2400 wrote to memory of 2772 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 31 PID 2400 wrote to memory of 2772 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 31 PID 2400 wrote to memory of 2772 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 31 PID 2400 wrote to memory of 2772 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 31 PID 2400 wrote to memory of 2772 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 31 PID 2400 wrote to memory of 2772 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 31 PID 2400 wrote to memory of 2772 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 31 PID 2400 wrote to memory of 2772 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 31 PID 2400 wrote to memory of 2772 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 31 PID 2400 wrote to memory of 2772 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 31 PID 2400 wrote to memory of 2772 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 31 PID 2400 wrote to memory of 2772 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 31 PID 2400 wrote to memory of 2772 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 31 PID 2400 wrote to memory of 2772 2400 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 31 PID 2380 wrote to memory of 2600 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 32 PID 2380 wrote to memory of 2600 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 32 PID 2380 wrote to memory of 2600 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 32 PID 2380 wrote to memory of 2600 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 32 PID 2380 wrote to memory of 2600 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 32 PID 2380 wrote to memory of 2600 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 32 PID 2380 wrote to memory of 2600 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 32 PID 2380 wrote to memory of 2600 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 32 PID 2380 wrote to memory of 2600 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 32 PID 2380 wrote to memory of 2600 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 32 PID 2380 wrote to memory of 2600 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 32 PID 2380 wrote to memory of 2600 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 32 PID 2380 wrote to memory of 2600 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 32 PID 2380 wrote to memory of 2600 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 32 PID 2380 wrote to memory of 2600 2380 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Roaming\interpolice.exeC:\Users\Admin\AppData\Roaming\interpolice.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
-
C:\Users\Admin\AppData\Roaming\interpolice.exeC:\Users\Admin\AppData\Roaming\interpolice.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50856a2a6089ef9046f78b1e45f5d8162
SHA1d7e6737ec0d1c478a9d0bd6df20e33e0f410a014
SHA256b1fb8e964d0b091b8af2d72221b64cebe25ae46ea2b6314a6d2c0be05e5d969e
SHA5120a0739a57f743ceb2dd99e73bfd900712075a2cad240264ab2c432ac7fbcb2ed0ce28c332ba44b48ef4acf9b5416f7a8d292d5594a63ae316503be9d4e3bd29d