Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2025, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe
-
Size
4.2MB
-
MD5
b4570a04fa7d1ac33afb101300c73d54
-
SHA1
4522fb0cf2c0aee291842688c20020651343c4a0
-
SHA256
69cbfbc1b1ab38241efbeeb9cf2bbd839448981f4f10ee6b1e4bc5d21f2acb3b
-
SHA512
5c768a29e0be735ac691cfbae2f40b238e9782b9b9d6c0edda98d595b3defd0324bd132180bd8d7e2944349940fa69645d31ade649828992b10bd2fdd0bb153f
-
SSDEEP
98304:5Ff3GTKdT1WUBSDiUpYCpjnjTyuGkQcdBDY2yP6uvrGNrAWsJA:5FuKdRWUBSDnbHfhjzyP6mWI
Malware Config
Signatures
-
Darkcomet family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe -
Executes dropped EXE 2 IoCs
pid Process 4140 ǭȜƂƈӂ.exe 2720 taskmgr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Essentials = "C:\\Users\\Admin\\AppData\\Local\\Temp\\taskmgr.exe" ǭȜƂƈӂ.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3884 set thread context of 2720 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ǭȜƂƈӂ.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000_Classes\Local Settings JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5004 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5004 vlc.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe Token: SeIncreaseQuotaPrivilege 2720 taskmgr.exe Token: SeSecurityPrivilege 2720 taskmgr.exe Token: SeTakeOwnershipPrivilege 2720 taskmgr.exe Token: SeLoadDriverPrivilege 2720 taskmgr.exe Token: SeSystemProfilePrivilege 2720 taskmgr.exe Token: SeSystemtimePrivilege 2720 taskmgr.exe Token: SeProfSingleProcessPrivilege 2720 taskmgr.exe Token: SeIncBasePriorityPrivilege 2720 taskmgr.exe Token: SeCreatePagefilePrivilege 2720 taskmgr.exe Token: SeBackupPrivilege 2720 taskmgr.exe Token: SeRestorePrivilege 2720 taskmgr.exe Token: SeShutdownPrivilege 2720 taskmgr.exe Token: SeDebugPrivilege 2720 taskmgr.exe Token: SeSystemEnvironmentPrivilege 2720 taskmgr.exe Token: SeChangeNotifyPrivilege 2720 taskmgr.exe Token: SeRemoteShutdownPrivilege 2720 taskmgr.exe Token: SeUndockPrivilege 2720 taskmgr.exe Token: SeManageVolumePrivilege 2720 taskmgr.exe Token: SeImpersonatePrivilege 2720 taskmgr.exe Token: SeCreateGlobalPrivilege 2720 taskmgr.exe Token: 33 2720 taskmgr.exe Token: 34 2720 taskmgr.exe Token: 35 2720 taskmgr.exe Token: 36 2720 taskmgr.exe Token: 33 4956 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4956 AUDIODG.EXE Token: 33 5004 vlc.exe Token: SeIncBasePriorityPrivilege 5004 vlc.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 5004 vlc.exe 5004 vlc.exe 5004 vlc.exe 5004 vlc.exe 5004 vlc.exe 5004 vlc.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 5004 vlc.exe 5004 vlc.exe 5004 vlc.exe 5004 vlc.exe 5004 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2720 taskmgr.exe 5004 vlc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3884 wrote to memory of 3100 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 86 PID 3884 wrote to memory of 3100 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 86 PID 3884 wrote to memory of 3100 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 86 PID 3100 wrote to memory of 4028 3100 csc.exe 89 PID 3100 wrote to memory of 4028 3100 csc.exe 89 PID 3100 wrote to memory of 4028 3100 csc.exe 89 PID 3884 wrote to memory of 4140 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 90 PID 3884 wrote to memory of 4140 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 90 PID 3884 wrote to memory of 4140 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 90 PID 3884 wrote to memory of 2720 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 91 PID 3884 wrote to memory of 2720 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 91 PID 3884 wrote to memory of 2720 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 91 PID 3884 wrote to memory of 2720 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 91 PID 3884 wrote to memory of 2720 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 91 PID 3884 wrote to memory of 2720 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 91 PID 3884 wrote to memory of 2720 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 91 PID 3884 wrote to memory of 2720 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 91 PID 3884 wrote to memory of 2720 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 91 PID 3884 wrote to memory of 2720 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 91 PID 3884 wrote to memory of 2720 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 91 PID 3884 wrote to memory of 2720 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 91 PID 3884 wrote to memory of 2720 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 91 PID 3884 wrote to memory of 2720 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 91 PID 3884 wrote to memory of 5004 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 92 PID 3884 wrote to memory of 5004 3884 JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b4570a04fa7d1ac33afb101300c73d54.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\_gasqmke.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES784E.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC784D.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:4028
-
-
-
C:\Users\Admin\AppData\Local\Temp\ǭȜƂƈӂ.exe"C:\Users\Admin\AppData\Local\Temp\ǭȜƂƈӂ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4140
-
-
C:\Users\Admin\AppData\Local\Temp\taskmgr.exeC:\Users\Admin\AppData\Local\Temp\taskmgr.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2720
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\מישל כהן יש מקום ביצוע הגמר.mp3"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5004
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4b4 0x4641⤵
- Suspicious use of AdjustPrivilegeToken
PID:4956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a9c9e57a04bf8e1a7cb31c2186577431
SHA1a21422bc35b409d72721f13d5edc81bac6a77c67
SHA2567283cf96bea70b0d7c77d6550bc2406dc62584908571fb8047d0d4d6d006a936
SHA512dc85829312ec5959400560e7815e460bfac4b446b116c3b12bb3c46ce8118994b35f9cc44c6e1150861f01b115d6072aae06ed84f11770f3ec0fd256d9be344f
-
Filesize
34KB
MD5e118330b4629b12368d91b9df6488be0
SHA1ce90218c7e3b90df2a3409ec253048bb6472c2fd
SHA2563a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9
SHA512ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0
-
Filesize
4KB
MD59ebce9003510ba747362ef47d948a7c1
SHA19e88e98db4cffa9e00badca03026cc4f898a4d6b
SHA2564d0d4e2979a328564e541b387bc0acb438b22a72651b703182cee8df8c5acf1b
SHA512ede4e8e6f0ff371082b39800a1787f0f2bb377f627da2ccfdcea8facee18f3cb33e6154f0452c65b6b8262d887c3cb3a643a46c8222b39bbf888a5149c4dea5b
-
Filesize
3.1MB
MD5dfd312879ce215a472ccfff1f6edcc83
SHA11ed6991e2876a8f3921e0629980acb7ea6482d19
SHA256e707e9a797191b9f64d3a5fc48b09ca49a429b35b1d9bef250f30bd75278e23d
SHA512b5d2e82e8be7b930f678cf2c227e59f0de2fadb7b3c5c9b408ded5396a2254b9bb3976c34d3c6412cf71968f0ae8446c1b197b969b464bc613f178898a52d736
-
Filesize
636B
MD550363950c08ac8e50585c99d2ffa9f71
SHA1d8f71b835a534ce0ff378c62a9a78558eda9c235
SHA256ea2e0d4bf91002fa267b3ea49cd25d3ed3a4aaac88ff14fc7b14d09506eb0ae1
SHA51296029d490fd171a02f42019a3b983d7dc3a638f1812527510aae571f7760bc72ecfd29e4bdb8ac1a3a2d5af83b931ac8fdfce0af9ec33247d0243e8f4bdbe025
-
Filesize
1KB
MD5f89d88c9df4920a28f1e50bdd677686e
SHA1956a7b21a6a243588db21f24eb19f36e75128367
SHA2567b250b2607bb276cf970952c966eec884d9d1586eb2f27ee9155376a0e820537
SHA5123ce3f52e9c440924dd47cd35ed78763b15eafbbcf1777c1e5fc7587b278108a1096aeeb81568e394532c75db1ffb785e24e66e752333e41971096556e3dee4ce
-
Filesize
263B
MD56f975b2d1b05172a04e14aa2736763f6
SHA1cfbe4b2a4a326559132a5d1680d7553e7d1025fc
SHA256b73218741b46fcf26db7c53bf14eeaaea5f8a1016c21b4762521d6a7ddfd53d8
SHA51212aa73fe18f4fd8525db258bdafa16544f0281dc6515706f0f9f66d8ea8ce20617797c838600e855e7e10c5bd0852480848bc0a1306889c230d5114dc4e11583