Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2025, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe
-
Size
1.1MB
-
MD5
b25d4a1c7e3caddfd7e489d9e77389ba
-
SHA1
02abd2fcd6bdf8ece338941c4407bf362cf2e455
-
SHA256
3bb1029c0d84010dcc585e5ee1903ebf8b456b80a790109632dc8a6988f9d64a
-
SHA512
9c3aff9c2f0597a3cc2b804a756060314d08409fa1bbde4dcbbea377a3518edb5c7ba10ff2c223c20004795911e25dfa30d366006d79f69c8ba17ebee7eee42e
-
SSDEEP
12288:kCdf83r0wfmRTTcCChotw/lKR5U+194aLS/gu9cyx0a8+RYNaFWi7e4iL64cc66i:c0Q6JlZA+CthKNSVgx+WZc
Malware Config
Extracted
darkcomet
Guest16
sophieinseva.no-ip.org:1500
DC_MUTEX-F54S21D
-
gencode
Um25sWL8RPAf
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe -
Executes dropped EXE 2 IoCs
pid Process 2192 interpolice.exe 452 interpolice.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\interpolice = "C:\\Users\\Admin\\AppData\\Roaming\\Livejasmin ACL.exe" JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\interpolice = "C:\\Users\\Admin\\AppData\\Roaming\\Livejasmin ACL.exe" JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4428 set thread context of 2192 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 85 PID 3440 set thread context of 452 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language interpolice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language interpolice.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeDebugPrivilege 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe Token: SeDebugPrivilege 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe Token: SeIncreaseQuotaPrivilege 2192 interpolice.exe Token: SeSecurityPrivilege 2192 interpolice.exe Token: SeTakeOwnershipPrivilege 2192 interpolice.exe Token: SeLoadDriverPrivilege 2192 interpolice.exe Token: SeSystemProfilePrivilege 2192 interpolice.exe Token: SeSystemtimePrivilege 2192 interpolice.exe Token: SeProfSingleProcessPrivilege 2192 interpolice.exe Token: SeIncBasePriorityPrivilege 2192 interpolice.exe Token: SeCreatePagefilePrivilege 2192 interpolice.exe Token: SeBackupPrivilege 2192 interpolice.exe Token: SeRestorePrivilege 2192 interpolice.exe Token: SeShutdownPrivilege 2192 interpolice.exe Token: SeDebugPrivilege 2192 interpolice.exe Token: SeSystemEnvironmentPrivilege 2192 interpolice.exe Token: SeChangeNotifyPrivilege 2192 interpolice.exe Token: SeRemoteShutdownPrivilege 2192 interpolice.exe Token: SeUndockPrivilege 2192 interpolice.exe Token: SeManageVolumePrivilege 2192 interpolice.exe Token: SeImpersonatePrivilege 2192 interpolice.exe Token: SeCreateGlobalPrivilege 2192 interpolice.exe Token: 33 2192 interpolice.exe Token: 34 2192 interpolice.exe Token: 35 2192 interpolice.exe Token: 36 2192 interpolice.exe Token: SeIncreaseQuotaPrivilege 452 interpolice.exe Token: SeSecurityPrivilege 452 interpolice.exe Token: SeTakeOwnershipPrivilege 452 interpolice.exe Token: SeLoadDriverPrivilege 452 interpolice.exe Token: SeSystemProfilePrivilege 452 interpolice.exe Token: SeSystemtimePrivilege 452 interpolice.exe Token: SeProfSingleProcessPrivilege 452 interpolice.exe Token: SeIncBasePriorityPrivilege 452 interpolice.exe Token: SeCreatePagefilePrivilege 452 interpolice.exe Token: SeBackupPrivilege 452 interpolice.exe Token: SeRestorePrivilege 452 interpolice.exe Token: SeShutdownPrivilege 452 interpolice.exe Token: SeDebugPrivilege 452 interpolice.exe Token: SeSystemEnvironmentPrivilege 452 interpolice.exe Token: SeChangeNotifyPrivilege 452 interpolice.exe Token: SeRemoteShutdownPrivilege 452 interpolice.exe Token: SeUndockPrivilege 452 interpolice.exe Token: SeManageVolumePrivilege 452 interpolice.exe Token: SeImpersonatePrivilege 452 interpolice.exe Token: SeCreateGlobalPrivilege 452 interpolice.exe Token: 33 452 interpolice.exe Token: 34 452 interpolice.exe Token: 35 452 interpolice.exe Token: 36 452 interpolice.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2192 interpolice.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 3440 wrote to memory of 4428 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 84 PID 3440 wrote to memory of 4428 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 84 PID 3440 wrote to memory of 4428 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 84 PID 4428 wrote to memory of 2192 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 85 PID 4428 wrote to memory of 2192 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 85 PID 4428 wrote to memory of 2192 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 85 PID 4428 wrote to memory of 2192 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 85 PID 4428 wrote to memory of 2192 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 85 PID 4428 wrote to memory of 2192 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 85 PID 4428 wrote to memory of 2192 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 85 PID 4428 wrote to memory of 2192 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 85 PID 4428 wrote to memory of 2192 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 85 PID 4428 wrote to memory of 2192 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 85 PID 4428 wrote to memory of 2192 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 85 PID 4428 wrote to memory of 2192 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 85 PID 4428 wrote to memory of 2192 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 85 PID 4428 wrote to memory of 2192 4428 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 85 PID 3440 wrote to memory of 452 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 86 PID 3440 wrote to memory of 452 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 86 PID 3440 wrote to memory of 452 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 86 PID 3440 wrote to memory of 452 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 86 PID 3440 wrote to memory of 452 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 86 PID 3440 wrote to memory of 452 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 86 PID 3440 wrote to memory of 452 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 86 PID 3440 wrote to memory of 452 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 86 PID 3440 wrote to memory of 452 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 86 PID 3440 wrote to memory of 452 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 86 PID 3440 wrote to memory of 452 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 86 PID 3440 wrote to memory of 452 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 86 PID 3440 wrote to memory of 452 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 86 PID 3440 wrote to memory of 452 3440 JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b25d4a1c7e3caddfd7e489d9e77389ba.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Roaming\interpolice.exeC:\Users\Admin\AppData\Roaming\interpolice.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2192
-
-
-
C:\Users\Admin\AppData\Roaming\interpolice.exeC:\Users\Admin\AppData\Roaming\interpolice.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50856a2a6089ef9046f78b1e45f5d8162
SHA1d7e6737ec0d1c478a9d0bd6df20e33e0f410a014
SHA256b1fb8e964d0b091b8af2d72221b64cebe25ae46ea2b6314a6d2c0be05e5d969e
SHA5120a0739a57f743ceb2dd99e73bfd900712075a2cad240264ab2c432ac7fbcb2ed0ce28c332ba44b48ef4acf9b5416f7a8d292d5594a63ae316503be9d4e3bd29d