Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/02/2025, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe
-
Size
773KB
-
MD5
b4669ec3c6f123056870cc65ec7617af
-
SHA1
d604733a3739f3bc4b81f5b11c01037d26a4709c
-
SHA256
470e6b6b2ddd6b3a99a290e4fb1fd88af6fac6dfdb2263cc0ab9af0036534990
-
SHA512
fb15a8b6e0921671826a806a62ff9934e3c998dfba76302585e6f05c73b7e2ad1fafb9102515e409273465434f6dfb928ed31befe5c6cae2c4730ab8d1bfc882
-
SSDEEP
24576:esYJ18CjqIjVGhw3NyJFee1LOJEPhxN2vcFKuM:esY78Cjq+Ghw3NyJE8yJ4ucRM
Malware Config
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 2684 audiodgi.exe 2912 wmpmetwk.exe 2892 wmpmetwk.exe -
Loads dropped DLL 4 IoCs
pid Process 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2684 audiodgi.exe 2912 wmpmetwk.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\audiodgi.exe" audiodgi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2912 set thread context of 2892 2912 wmpmetwk.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpmetwk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpmetwk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language audiodgi.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 2684 audiodgi.exe 2912 wmpmetwk.exe 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe Token: SeDebugPrivilege 2684 audiodgi.exe Token: SeDebugPrivilege 2912 wmpmetwk.exe Token: SeIncreaseQuotaPrivilege 2892 wmpmetwk.exe Token: SeSecurityPrivilege 2892 wmpmetwk.exe Token: SeTakeOwnershipPrivilege 2892 wmpmetwk.exe Token: SeLoadDriverPrivilege 2892 wmpmetwk.exe Token: SeSystemProfilePrivilege 2892 wmpmetwk.exe Token: SeSystemtimePrivilege 2892 wmpmetwk.exe Token: SeProfSingleProcessPrivilege 2892 wmpmetwk.exe Token: SeIncBasePriorityPrivilege 2892 wmpmetwk.exe Token: SeCreatePagefilePrivilege 2892 wmpmetwk.exe Token: SeBackupPrivilege 2892 wmpmetwk.exe Token: SeRestorePrivilege 2892 wmpmetwk.exe Token: SeShutdownPrivilege 2892 wmpmetwk.exe Token: SeDebugPrivilege 2892 wmpmetwk.exe Token: SeSystemEnvironmentPrivilege 2892 wmpmetwk.exe Token: SeChangeNotifyPrivilege 2892 wmpmetwk.exe Token: SeRemoteShutdownPrivilege 2892 wmpmetwk.exe Token: SeUndockPrivilege 2892 wmpmetwk.exe Token: SeManageVolumePrivilege 2892 wmpmetwk.exe Token: SeImpersonatePrivilege 2892 wmpmetwk.exe Token: SeCreateGlobalPrivilege 2892 wmpmetwk.exe Token: 33 2892 wmpmetwk.exe Token: 34 2892 wmpmetwk.exe Token: 35 2892 wmpmetwk.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2892 wmpmetwk.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2712 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 31 PID 2708 wrote to memory of 2712 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 31 PID 2708 wrote to memory of 2712 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 31 PID 2708 wrote to memory of 2712 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 31 PID 2708 wrote to memory of 2684 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 32 PID 2708 wrote to memory of 2684 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 32 PID 2708 wrote to memory of 2684 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 32 PID 2708 wrote to memory of 2684 2708 JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe 32 PID 2684 wrote to memory of 2912 2684 audiodgi.exe 33 PID 2684 wrote to memory of 2912 2684 audiodgi.exe 33 PID 2684 wrote to memory of 2912 2684 audiodgi.exe 33 PID 2684 wrote to memory of 2912 2684 audiodgi.exe 33 PID 2912 wrote to memory of 2892 2912 wmpmetwk.exe 34 PID 2912 wrote to memory of 2892 2912 wmpmetwk.exe 34 PID 2912 wrote to memory of 2892 2912 wmpmetwk.exe 34 PID 2912 wrote to memory of 2892 2912 wmpmetwk.exe 34 PID 2912 wrote to memory of 2892 2912 wmpmetwk.exe 34 PID 2912 wrote to memory of 2892 2912 wmpmetwk.exe 34 PID 2912 wrote to memory of 2892 2912 wmpmetwk.exe 34 PID 2912 wrote to memory of 2892 2912 wmpmetwk.exe 34 PID 2912 wrote to memory of 2892 2912 wmpmetwk.exe 34 PID 2912 wrote to memory of 2892 2912 wmpmetwk.exe 34 PID 2912 wrote to memory of 2892 2912 wmpmetwk.exe 34 PID 2912 wrote to memory of 2892 2912 wmpmetwk.exe 34 PID 2912 wrote to memory of 2892 2912 wmpmetwk.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b4669ec3c6f123056870cc65ec7617af.exe2⤵PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe"C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe"C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exeC:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2892
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
773KB
MD5b4669ec3c6f123056870cc65ec7617af
SHA1d604733a3739f3bc4b81f5b11c01037d26a4709c
SHA256470e6b6b2ddd6b3a99a290e4fb1fd88af6fac6dfdb2263cc0ab9af0036534990
SHA512fb15a8b6e0921671826a806a62ff9934e3c998dfba76302585e6f05c73b7e2ad1fafb9102515e409273465434f6dfb928ed31befe5c6cae2c4730ab8d1bfc882
-
Filesize
10KB
MD583ce94edcf6b43e60e467a9f22705d3e
SHA10a3738cbee68a53e8d5e93f83d5b633f8ae95232
SHA256558224443ed55cc3efc377ff06ba86ef2d4c910da4d3d47c590377c487c1d63f
SHA51251675f7143d6666452dc231ffc03e0dab642f2c2c8a3d61dc567beec825ea52d45513243ea81d3873d44a66b8d7a1340f0b6e5ecac741c29d01813de8631d383