Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/02/2025, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe
-
Size
4.2MB
-
MD5
b4570a04fa7d1ac33afb101300c73d54
-
SHA1
4522fb0cf2c0aee291842688c20020651343c4a0
-
SHA256
69cbfbc1b1ab38241efbeeb9cf2bbd839448981f4f10ee6b1e4bc5d21f2acb3b
-
SHA512
5c768a29e0be735ac691cfbae2f40b238e9782b9b9d6c0edda98d595b3defd0324bd132180bd8d7e2944349940fa69645d31ade649828992b10bd2fdd0bb153f
-
SSDEEP
98304:5Ff3GTKdT1WUBSDiUpYCpjnjTyuGkQcdBDY2yP6uvrGNrAWsJA:5FuKdRWUBSDnbHfhjzyP6mWI
Malware Config
Signatures
-
Darkcomet family
-
Executes dropped EXE 2 IoCs
pid Process 2744 ǭȜƂƈӂ.exe 2864 taskmgr.exe -
Loads dropped DLL 3 IoCs
pid Process 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Essentials = "C:\\Users\\Admin\\AppData\\Local\\Temp\\taskmgr.exe" ǭȜƂƈӂ.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1764 set thread context of 2864 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ǭȜƂƈӂ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2740 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2740 vlc.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe Token: SeIncreaseQuotaPrivilege 2864 taskmgr.exe Token: SeSecurityPrivilege 2864 taskmgr.exe Token: SeTakeOwnershipPrivilege 2864 taskmgr.exe Token: SeLoadDriverPrivilege 2864 taskmgr.exe Token: SeSystemProfilePrivilege 2864 taskmgr.exe Token: SeSystemtimePrivilege 2864 taskmgr.exe Token: SeProfSingleProcessPrivilege 2864 taskmgr.exe Token: SeIncBasePriorityPrivilege 2864 taskmgr.exe Token: SeCreatePagefilePrivilege 2864 taskmgr.exe Token: SeBackupPrivilege 2864 taskmgr.exe Token: SeRestorePrivilege 2864 taskmgr.exe Token: SeShutdownPrivilege 2864 taskmgr.exe Token: SeDebugPrivilege 2864 taskmgr.exe Token: SeSystemEnvironmentPrivilege 2864 taskmgr.exe Token: SeChangeNotifyPrivilege 2864 taskmgr.exe Token: SeRemoteShutdownPrivilege 2864 taskmgr.exe Token: SeUndockPrivilege 2864 taskmgr.exe Token: SeManageVolumePrivilege 2864 taskmgr.exe Token: SeImpersonatePrivilege 2864 taskmgr.exe Token: SeCreateGlobalPrivilege 2864 taskmgr.exe Token: 33 2864 taskmgr.exe Token: 34 2864 taskmgr.exe Token: 35 2864 taskmgr.exe Token: 33 2740 vlc.exe Token: SeIncBasePriorityPrivilege 2740 vlc.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2740 vlc.exe 2740 vlc.exe 2740 vlc.exe 2740 vlc.exe 2740 vlc.exe 2740 vlc.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2740 vlc.exe 2740 vlc.exe 2740 vlc.exe 2740 vlc.exe 2740 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2864 taskmgr.exe 2740 vlc.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1764 wrote to memory of 2628 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 31 PID 1764 wrote to memory of 2628 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 31 PID 1764 wrote to memory of 2628 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 31 PID 1764 wrote to memory of 2628 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 31 PID 2628 wrote to memory of 2992 2628 csc.exe 33 PID 2628 wrote to memory of 2992 2628 csc.exe 33 PID 2628 wrote to memory of 2992 2628 csc.exe 33 PID 2628 wrote to memory of 2992 2628 csc.exe 33 PID 1764 wrote to memory of 2744 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 34 PID 1764 wrote to memory of 2744 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 34 PID 1764 wrote to memory of 2744 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 34 PID 1764 wrote to memory of 2744 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 34 PID 1764 wrote to memory of 2864 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 35 PID 1764 wrote to memory of 2864 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 35 PID 1764 wrote to memory of 2864 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 35 PID 1764 wrote to memory of 2864 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 35 PID 1764 wrote to memory of 2864 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 35 PID 1764 wrote to memory of 2864 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 35 PID 1764 wrote to memory of 2864 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 35 PID 1764 wrote to memory of 2864 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 35 PID 1764 wrote to memory of 2864 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 35 PID 1764 wrote to memory of 2864 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 35 PID 1764 wrote to memory of 2864 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 35 PID 1764 wrote to memory of 2864 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 35 PID 1764 wrote to memory of 2864 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 35 PID 1764 wrote to memory of 2740 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 36 PID 1764 wrote to memory of 2740 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 36 PID 1764 wrote to memory of 2740 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 36 PID 1764 wrote to memory of 2740 1764 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ivuik_ex.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE580.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCE57F.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2992
-
-
-
C:\Users\Admin\AppData\Local\Temp\ǭȜƂƈӂ.exe"C:\Users\Admin\AppData\Local\Temp\ǭȜƂƈӂ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exeC:\Users\Admin\AppData\Local\Temp\taskmgr.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\מישל כהן יש מקום ביצוע הגמר.mp3"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD554629bacf2ed09be61585514f8abdcc1
SHA187186b119115ab204a44720eded3dd4c165242dd
SHA256a323886c48e7fd297e8aaf059d13bee3d1ff8026c371829d98c2928ff6c9d5b7
SHA5120c5c38ee305370852b6e246ea5e727353554a970f556f3ba9be23f44bf612e721a2509a72e29ba5160d258fb6e99abd054f92c7ae2a933c5eb01134a534e0d16
-
Filesize
4KB
MD5654bd951179d81eb22ac6067b089dc0f
SHA11ec0dc069a2adb230207c54ead0b5f593e22fba4
SHA256a427cfdd5a5d64b9eed9677580e2ec6601331b0c34dff45adabbf6b814fd2785
SHA512fad31318fe3a58c041e780b80a2cee6fd904f5df1be9e3f247ee3d569ac1389199f3a58940d7eb0b00d6abb20c83acc353d6000f4c58ed305269e3dcf7f07d9d
-
Filesize
3.1MB
MD5dfd312879ce215a472ccfff1f6edcc83
SHA11ed6991e2876a8f3921e0629980acb7ea6482d19
SHA256e707e9a797191b9f64d3a5fc48b09ca49a429b35b1d9bef250f30bd75278e23d
SHA512b5d2e82e8be7b930f678cf2c227e59f0de2fadb7b3c5c9b408ded5396a2254b9bb3976c34d3c6412cf71968f0ae8446c1b197b969b464bc613f178898a52d736
-
Filesize
636B
MD550363950c08ac8e50585c99d2ffa9f71
SHA1d8f71b835a534ce0ff378c62a9a78558eda9c235
SHA256ea2e0d4bf91002fa267b3ea49cd25d3ed3a4aaac88ff14fc7b14d09506eb0ae1
SHA51296029d490fd171a02f42019a3b983d7dc3a638f1812527510aae571f7760bc72ecfd29e4bdb8ac1a3a2d5af83b931ac8fdfce0af9ec33247d0243e8f4bdbe025
-
Filesize
1KB
MD5f89d88c9df4920a28f1e50bdd677686e
SHA1956a7b21a6a243588db21f24eb19f36e75128367
SHA2567b250b2607bb276cf970952c966eec884d9d1586eb2f27ee9155376a0e820537
SHA5123ce3f52e9c440924dd47cd35ed78763b15eafbbcf1777c1e5fc7587b278108a1096aeeb81568e394532c75db1ffb785e24e66e752333e41971096556e3dee4ce
-
Filesize
263B
MD59667e3e0104a9581a59f3d6750b4e417
SHA1eaf2ffba9d37492e9d6747ae15ae05ff0063b9b8
SHA2568a3b08efdcc4c767b298547b8ef3f1624c43264c52c92e0cc2fbbbe57eeffac1
SHA51252d310cc1d47aa95f7f26e140cee871ea496f8aae46ba713b709d3229a10ee7071bda148de759806479a33378951dd8ee25b0f6ed0f1c49f1543fa7fd11f800d
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2