Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2025, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe
-
Size
1.1MB
-
MD5
b83040da3f1807b70073995b76f404fb
-
SHA1
9b1710d570ad771bd0a193f046133757765ab2f6
-
SHA256
10291c9688d1b2c6b06cd10c5ef4e7a8e8d19e5b445d0f7cacae8a920b5a1bfe
-
SHA512
7f6f9762556e752c96e0a0b27644f03e57c5a535da1cd78a4db9d794d0be5ae711f3f61138f46f42a20a39faa7977e77f45351a672db11946cbffe3638db71b5
-
SSDEEP
12288:AVPFrG3e4v9x8ar3sIBR9ewSOHFMpdYNOQX7Tuz1UJSac:4keE9War3sIBR9eEl40OAl1c
Malware Config
Extracted
darkcomet
Altri x
jani1991.no-ip.org:1604
DC_MUTEX-0RF6295
-
gencode
v1BAksQG+Lzi
-
install
false
-
offline_keylogger
true
-
password
jani1991bmw31991
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 1 IoCs
pid Process 4968 svchost.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 832 set thread context of 4968 832 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 80 -
resource yara_rule behavioral2/memory/4968-7-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-11-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-12-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-14-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-15-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-18-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-19-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-20-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-16-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-24-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-25-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-30-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-31-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-32-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-33-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-34-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-35-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-36-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-37-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-38-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-39-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-40-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-41-0x0000000000400000-0x00000000004F9000-memory.dmp upx behavioral2/memory/4968-42-0x0000000000400000-0x00000000004F9000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4968 svchost.exe Token: SeSecurityPrivilege 4968 svchost.exe Token: SeTakeOwnershipPrivilege 4968 svchost.exe Token: SeLoadDriverPrivilege 4968 svchost.exe Token: SeSystemProfilePrivilege 4968 svchost.exe Token: SeSystemtimePrivilege 4968 svchost.exe Token: SeProfSingleProcessPrivilege 4968 svchost.exe Token: SeIncBasePriorityPrivilege 4968 svchost.exe Token: SeCreatePagefilePrivilege 4968 svchost.exe Token: SeBackupPrivilege 4968 svchost.exe Token: SeRestorePrivilege 4968 svchost.exe Token: SeShutdownPrivilege 4968 svchost.exe Token: SeDebugPrivilege 4968 svchost.exe Token: SeSystemEnvironmentPrivilege 4968 svchost.exe Token: SeChangeNotifyPrivilege 4968 svchost.exe Token: SeRemoteShutdownPrivilege 4968 svchost.exe Token: SeUndockPrivilege 4968 svchost.exe Token: SeManageVolumePrivilege 4968 svchost.exe Token: SeImpersonatePrivilege 4968 svchost.exe Token: SeCreateGlobalPrivilege 4968 svchost.exe Token: 33 4968 svchost.exe Token: 34 4968 svchost.exe Token: 35 4968 svchost.exe Token: 36 4968 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4968 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 832 wrote to memory of 4968 832 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 80 PID 832 wrote to memory of 4968 832 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 80 PID 832 wrote to memory of 4968 832 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 80 PID 832 wrote to memory of 4968 832 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 80 PID 832 wrote to memory of 4968 832 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 80 PID 832 wrote to memory of 4968 832 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 80 PID 832 wrote to memory of 4968 832 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 80 PID 832 wrote to memory of 4968 832 JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe 80 PID 4968 wrote to memory of 3696 4968 svchost.exe 81 PID 4968 wrote to memory of 3696 4968 svchost.exe 81 PID 4968 wrote to memory of 3696 4968 svchost.exe 81 PID 4968 wrote to memory of 3312 4968 svchost.exe 82 PID 4968 wrote to memory of 3312 4968 svchost.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b83040da3f1807b70073995b76f404fb.exe"1⤵
- Drops autorun.inf file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:3696
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵PID:3312
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34