Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2025, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b72e3f8de2208c223f1b3c43bc33c40f.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b72e3f8de2208c223f1b3c43bc33c40f.exe
-
Size
1.1MB
-
MD5
b72e3f8de2208c223f1b3c43bc33c40f
-
SHA1
60e5fca492812730972e01e15c24554ad07d1712
-
SHA256
26c087a30ff5843dd5cd9fa5f0077cc8550f698f0e63de15637023596dd383ca
-
SHA512
a5d23404716c9d0e8cf934465d57eecf36e3a5f3033eb12e4fc13c73d561b54573a7e87c047c599837d605de9f1fb9b4df8837315f1c792c631668557b2e5588
-
SSDEEP
12288:fkq2lbFpfgjxFRpQqrfd0MzmUOLhnK2higmjQlQHeQ1ag4fobbcAIPJm6Lbagtbf:f8yjtxqLhnphigwQljAb0xjaeFb
Malware Config
Extracted
darkcomet
TestGuest
ernesc.no-ip.biz:4662
DC_MUTEX-EGAZCCU
-
gencode
NDJLcwT5ytCM
-
install
false
-
offline_keylogger
true
-
password
h8you
-
persistence
false
Signatures
-
Darkcomet family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation JaffaCakes118_b72e3f8de2208c223f1b3c43bc33c40f.exe -
Executes dropped EXE 2 IoCs
pid Process 3596 test.exe 2184 Cbu0LKaed2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbu0LKaed2.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3596 test.exe Token: SeSecurityPrivilege 3596 test.exe Token: SeTakeOwnershipPrivilege 3596 test.exe Token: SeLoadDriverPrivilege 3596 test.exe Token: SeSystemProfilePrivilege 3596 test.exe Token: SeSystemtimePrivilege 3596 test.exe Token: SeProfSingleProcessPrivilege 3596 test.exe Token: SeIncBasePriorityPrivilege 3596 test.exe Token: SeCreatePagefilePrivilege 3596 test.exe Token: SeBackupPrivilege 3596 test.exe Token: SeRestorePrivilege 3596 test.exe Token: SeShutdownPrivilege 3596 test.exe Token: SeDebugPrivilege 3596 test.exe Token: SeSystemEnvironmentPrivilege 3596 test.exe Token: SeChangeNotifyPrivilege 3596 test.exe Token: SeRemoteShutdownPrivilege 3596 test.exe Token: SeUndockPrivilege 3596 test.exe Token: SeManageVolumePrivilege 3596 test.exe Token: SeImpersonatePrivilege 3596 test.exe Token: SeCreateGlobalPrivilege 3596 test.exe Token: 33 3596 test.exe Token: 34 3596 test.exe Token: 35 3596 test.exe Token: 36 3596 test.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2184 Cbu0LKaed2.exe 3596 test.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1596 wrote to memory of 3596 1596 JaffaCakes118_b72e3f8de2208c223f1b3c43bc33c40f.exe 82 PID 1596 wrote to memory of 3596 1596 JaffaCakes118_b72e3f8de2208c223f1b3c43bc33c40f.exe 82 PID 1596 wrote to memory of 3596 1596 JaffaCakes118_b72e3f8de2208c223f1b3c43bc33c40f.exe 82 PID 1596 wrote to memory of 2184 1596 JaffaCakes118_b72e3f8de2208c223f1b3c43bc33c40f.exe 83 PID 1596 wrote to memory of 2184 1596 JaffaCakes118_b72e3f8de2208c223f1b3c43bc33c40f.exe 83 PID 1596 wrote to memory of 2184 1596 JaffaCakes118_b72e3f8de2208c223f1b3c43bc33c40f.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b72e3f8de2208c223f1b3c43bc33c40f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b72e3f8de2208c223f1b3c43bc33c40f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\Cbu0LKaed2.exe"C:\Users\Admin\AppData\Local\Temp\Cbu0LKaed2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5b91f5313b805288e436bdad4afd15574
SHA16e878dea806a05322a6b523d4a2cba52d5446a34
SHA256069f607b3668329354a660f8e770514f485f02a0a7f157073cd8af5316de46f0
SHA512c51eba941ce3aec4a362b97940e4b1528d047a0d2937e50ca0101a28f3b82a5336b09e524a9fd7509ef156ee143da15b25128a00428f0b019de5502262a46eed
-
Filesize
690KB
MD58a366a4debf63551bdbbc4cac5a5658d
SHA11006fd750fc633f42aba9ba3d3c5cd4f0d117b78
SHA256f58a05a8af6129d96092fb1bf6dd3037a333a573325ccbfd5ab69b37b13d5e6e
SHA512d856ddf53b44b8bbe39cc922c8d93b95fc3a25ce9dce2c7fa9127d3f21c3b788ab0b10602533cc3f2dc38bf028bebf4ea1952538cfd77cba2452081a99b42baf