Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07/02/2025, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe
-
Size
1.6MB
-
MD5
b3df1761ad3b759e0759516bbcfc27c5
-
SHA1
ba9af5d9c407c527cc568421300302be09ebfdbe
-
SHA256
a8929b3d5c5a904027ada86379a74de93eb61eaee734eee53848220c8c220b69
-
SHA512
5ee8d97cd3a977f5bfc7c59b1199e1e8025a22e260328acd124d4dbd0b820a54332ef53a248fb9fe9139902fa57a2b43f28570dcbe4c347a99815150d028c2be
-
SSDEEP
49152:jhjcapo0JfYDSGvOsUhjcapo0JfYDSGvOs:V9lfYDSYW9lfYDSY
Malware Config
Signatures
-
Darkcomet family
-
Executes dropped EXE 1 IoCs
pid Process 2740 rzFumz.exe -
Loads dropped DLL 2 IoCs
pid Process 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2760 set thread context of 2896 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 31 PID 2740 set thread context of 2080 2740 rzFumz.exe 32 PID 2896 set thread context of 2684 2896 vbc.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rzFumz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2740 rzFumz.exe Token: SeSecurityPrivilege 2740 rzFumz.exe Token: SeTakeOwnershipPrivilege 2740 rzFumz.exe Token: SeLoadDriverPrivilege 2740 rzFumz.exe Token: SeSystemProfilePrivilege 2740 rzFumz.exe Token: SeSystemtimePrivilege 2740 rzFumz.exe Token: SeProfSingleProcessPrivilege 2740 rzFumz.exe Token: SeIncBasePriorityPrivilege 2740 rzFumz.exe Token: SeCreatePagefilePrivilege 2740 rzFumz.exe Token: SeBackupPrivilege 2740 rzFumz.exe Token: SeRestorePrivilege 2740 rzFumz.exe Token: SeShutdownPrivilege 2740 rzFumz.exe Token: SeDebugPrivilege 2740 rzFumz.exe Token: SeSystemEnvironmentPrivilege 2740 rzFumz.exe Token: SeChangeNotifyPrivilege 2740 rzFumz.exe Token: SeRemoteShutdownPrivilege 2740 rzFumz.exe Token: SeUndockPrivilege 2740 rzFumz.exe Token: SeManageVolumePrivilege 2740 rzFumz.exe Token: SeImpersonatePrivilege 2740 rzFumz.exe Token: SeCreateGlobalPrivilege 2740 rzFumz.exe Token: 33 2740 rzFumz.exe Token: 34 2740 rzFumz.exe Token: 35 2740 rzFumz.exe Token: SeIncreaseQuotaPrivilege 2896 vbc.exe Token: SeSecurityPrivilege 2896 vbc.exe Token: SeTakeOwnershipPrivilege 2896 vbc.exe Token: SeLoadDriverPrivilege 2896 vbc.exe Token: SeSystemProfilePrivilege 2896 vbc.exe Token: SeSystemtimePrivilege 2896 vbc.exe Token: SeProfSingleProcessPrivilege 2896 vbc.exe Token: SeIncBasePriorityPrivilege 2896 vbc.exe Token: SeCreatePagefilePrivilege 2896 vbc.exe Token: SeBackupPrivilege 2896 vbc.exe Token: SeRestorePrivilege 2896 vbc.exe Token: SeShutdownPrivilege 2896 vbc.exe Token: SeDebugPrivilege 2896 vbc.exe Token: SeSystemEnvironmentPrivilege 2896 vbc.exe Token: SeChangeNotifyPrivilege 2896 vbc.exe Token: SeRemoteShutdownPrivilege 2896 vbc.exe Token: SeUndockPrivilege 2896 vbc.exe Token: SeManageVolumePrivilege 2896 vbc.exe Token: SeImpersonatePrivilege 2896 vbc.exe Token: SeCreateGlobalPrivilege 2896 vbc.exe Token: 33 2896 vbc.exe Token: 34 2896 vbc.exe Token: 35 2896 vbc.exe Token: SeIncreaseQuotaPrivilege 2080 iexplore.exe Token: SeSecurityPrivilege 2080 iexplore.exe Token: SeTakeOwnershipPrivilege 2080 iexplore.exe Token: SeLoadDriverPrivilege 2080 iexplore.exe Token: SeSystemProfilePrivilege 2080 iexplore.exe Token: SeSystemtimePrivilege 2080 iexplore.exe Token: SeProfSingleProcessPrivilege 2080 iexplore.exe Token: SeIncBasePriorityPrivilege 2080 iexplore.exe Token: SeCreatePagefilePrivilege 2080 iexplore.exe Token: SeBackupPrivilege 2080 iexplore.exe Token: SeRestorePrivilege 2080 iexplore.exe Token: SeShutdownPrivilege 2080 iexplore.exe Token: SeDebugPrivilege 2080 iexplore.exe Token: SeSystemEnvironmentPrivilege 2080 iexplore.exe Token: SeChangeNotifyPrivilege 2080 iexplore.exe Token: SeRemoteShutdownPrivilege 2080 iexplore.exe Token: SeUndockPrivilege 2080 iexplore.exe Token: SeManageVolumePrivilege 2080 iexplore.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2740 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 30 PID 2760 wrote to memory of 2740 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 30 PID 2760 wrote to memory of 2740 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 30 PID 2760 wrote to memory of 2740 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 30 PID 2760 wrote to memory of 2896 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 31 PID 2760 wrote to memory of 2896 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 31 PID 2760 wrote to memory of 2896 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 31 PID 2760 wrote to memory of 2896 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 31 PID 2760 wrote to memory of 2896 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 31 PID 2760 wrote to memory of 2896 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 31 PID 2760 wrote to memory of 2896 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 31 PID 2760 wrote to memory of 2896 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 31 PID 2760 wrote to memory of 2896 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 31 PID 2760 wrote to memory of 2896 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 31 PID 2760 wrote to memory of 2896 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 31 PID 2760 wrote to memory of 2896 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 31 PID 2760 wrote to memory of 2896 2760 JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe 31 PID 2740 wrote to memory of 2080 2740 rzFumz.exe 32 PID 2740 wrote to memory of 2080 2740 rzFumz.exe 32 PID 2740 wrote to memory of 2080 2740 rzFumz.exe 32 PID 2740 wrote to memory of 2080 2740 rzFumz.exe 32 PID 2740 wrote to memory of 2080 2740 rzFumz.exe 32 PID 2740 wrote to memory of 2080 2740 rzFumz.exe 32 PID 2896 wrote to memory of 2684 2896 vbc.exe 33 PID 2896 wrote to memory of 2684 2896 vbc.exe 33 PID 2896 wrote to memory of 2684 2896 vbc.exe 33 PID 2896 wrote to memory of 2684 2896 vbc.exe 33 PID 2896 wrote to memory of 2684 2896 vbc.exe 33 PID 2896 wrote to memory of 2684 2896 vbc.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b3df1761ad3b759e0759516bbcfc27c5.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\rzFumz.exe"C:\Users\Admin\AppData\Local\Temp\rzFumz.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:2684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
820KB
MD54e60c5b5b0e6de2d865a90abc56a6543
SHA1e3481866659a68e9e4821943093003ca87ed9713
SHA25678c3e8fd1b03bdbdc661f0c2312f034ffbf992d578aff817b77100af2e23f052
SHA512b86d983ee65c84b34711d9be09a1b2a5de48d61442de4c54c6f0ef3dced2abb3930cad912ce86619f9095445f583fb8d51e50ffdf28e6ddae39108c395d6b05e