Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/02/2025, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe
-
Size
1.1MB
-
MD5
b83040da3f1807b70073995b76f404fb
-
SHA1
9b1710d570ad771bd0a193f046133757765ab2f6
-
SHA256
10291c9688d1b2c6b06cd10c5ef4e7a8e8d19e5b445d0f7cacae8a920b5a1bfe
-
SHA512
7f6f9762556e752c96e0a0b27644f03e57c5a535da1cd78a4db9d794d0be5ae711f3f61138f46f42a20a39faa7977e77f45351a672db11946cbffe3638db71b5
-
SSDEEP
12288:AVPFrG3e4v9x8ar3sIBR9ewSOHFMpdYNOQX7Tuz1UJSac:4keE9War3sIBR9eEl40OAl1c
Malware Config
Extracted
darkcomet
Altri x
jani1991.no-ip.org:1604
DC_MUTEX-0RF6295
-
gencode
v1BAksQG+Lzi
-
install
false
-
offline_keylogger
true
-
password
jani1991bmw31991
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 1 IoCs
pid Process 2916 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2388 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2388 set thread context of 2916 2388 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 30 PID 2916 set thread context of 2732 2916 svchost.exe 31 -
resource yara_rule behavioral1/memory/2916-17-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral1/memory/2916-19-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral1/memory/2916-23-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral1/memory/2916-22-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral1/memory/2916-21-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral1/memory/2916-28-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral1/memory/2916-20-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral1/memory/2916-11-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral1/memory/2916-13-0x0000000000400000-0x00000000004F9000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2916 svchost.exe Token: SeSecurityPrivilege 2916 svchost.exe Token: SeTakeOwnershipPrivilege 2916 svchost.exe Token: SeLoadDriverPrivilege 2916 svchost.exe Token: SeSystemProfilePrivilege 2916 svchost.exe Token: SeSystemtimePrivilege 2916 svchost.exe Token: SeProfSingleProcessPrivilege 2916 svchost.exe Token: SeIncBasePriorityPrivilege 2916 svchost.exe Token: SeCreatePagefilePrivilege 2916 svchost.exe Token: SeBackupPrivilege 2916 svchost.exe Token: SeRestorePrivilege 2916 svchost.exe Token: SeShutdownPrivilege 2916 svchost.exe Token: SeDebugPrivilege 2916 svchost.exe Token: SeSystemEnvironmentPrivilege 2916 svchost.exe Token: SeChangeNotifyPrivilege 2916 svchost.exe Token: SeRemoteShutdownPrivilege 2916 svchost.exe Token: SeUndockPrivilege 2916 svchost.exe Token: SeManageVolumePrivilege 2916 svchost.exe Token: SeImpersonatePrivilege 2916 svchost.exe Token: SeCreateGlobalPrivilege 2916 svchost.exe Token: 33 2916 svchost.exe Token: 34 2916 svchost.exe Token: 35 2916 svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2916 2388 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 30 PID 2388 wrote to memory of 2916 2388 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 30 PID 2388 wrote to memory of 2916 2388 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 30 PID 2388 wrote to memory of 2916 2388 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 30 PID 2388 wrote to memory of 2916 2388 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 30 PID 2388 wrote to memory of 2916 2388 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 30 PID 2388 wrote to memory of 2916 2388 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 30 PID 2388 wrote to memory of 2916 2388 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 30 PID 2916 wrote to memory of 2732 2916 svchost.exe 31 PID 2916 wrote to memory of 2732 2916 svchost.exe 31 PID 2916 wrote to memory of 2732 2916 svchost.exe 31 PID 2916 wrote to memory of 2732 2916 svchost.exe 31 PID 2916 wrote to memory of 2732 2916 svchost.exe 31 PID 2916 wrote to memory of 2732 2916 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe"1⤵
- Loads dropped DLL
- Drops autorun.inf file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98