Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/02/2025, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe
-
Size
952KB
-
MD5
0e6440e43ad14bb92f1d20cfe352bef0
-
SHA1
d2351bbd2ec971a352efb2c3fedd23030e89c9c8
-
SHA256
543754a66fa711c354599ed696e2f795de928fb3e661d316fd9774b05f3e5a46
-
SHA512
aa4150a3ed74a6e585a7f738905b501b26d261b9a4df0ea41392322d398a14138ece73c4f2f5e71d753ee8b2e606458526f637f39d9cdc49cdbabb7c03a2a561
-
SSDEEP
12288:byyy7Z3z4I8NXOGjwwG/ZjXsAHHz79p9NM5Tz103j2CF4TxQUOfhVPOSAE//VAci:baCI2OewFJN4mkxyHnnew1SatLRzD
Malware Config
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 3568 micoffice.exe 1268 micoffice.exe 3332 micoffice.exe -
Loads dropped DLL 5 IoCs
pid Process 3324 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 3324 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 3324 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 3324 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 3324 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\msoffice = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftOffice\\micoffice.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2012 set thread context of 3324 2012 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 30 PID 3568 set thread context of 1268 3568 micoffice.exe 35 PID 3568 set thread context of 3332 3568 micoffice.exe 36 -
resource yara_rule behavioral1/memory/3324-448-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1268-889-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3324-1037-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1268-1044-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3332 micoffice.exe Token: SeSecurityPrivilege 3332 micoffice.exe Token: SeTakeOwnershipPrivilege 3332 micoffice.exe Token: SeLoadDriverPrivilege 3332 micoffice.exe Token: SeSystemProfilePrivilege 3332 micoffice.exe Token: SeSystemtimePrivilege 3332 micoffice.exe Token: SeProfSingleProcessPrivilege 3332 micoffice.exe Token: SeIncBasePriorityPrivilege 3332 micoffice.exe Token: SeCreatePagefilePrivilege 3332 micoffice.exe Token: SeBackupPrivilege 3332 micoffice.exe Token: SeRestorePrivilege 3332 micoffice.exe Token: SeShutdownPrivilege 3332 micoffice.exe Token: SeDebugPrivilege 3332 micoffice.exe Token: SeSystemEnvironmentPrivilege 3332 micoffice.exe Token: SeChangeNotifyPrivilege 3332 micoffice.exe Token: SeRemoteShutdownPrivilege 3332 micoffice.exe Token: SeUndockPrivilege 3332 micoffice.exe Token: SeManageVolumePrivilege 3332 micoffice.exe Token: SeImpersonatePrivilege 3332 micoffice.exe Token: SeCreateGlobalPrivilege 3332 micoffice.exe Token: 33 3332 micoffice.exe Token: 34 3332 micoffice.exe Token: 35 3332 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe Token: SeDebugPrivilege 1268 micoffice.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2012 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 3324 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 3568 micoffice.exe 1268 micoffice.exe 3332 micoffice.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2012 wrote to memory of 3324 2012 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 30 PID 2012 wrote to memory of 3324 2012 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 30 PID 2012 wrote to memory of 3324 2012 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 30 PID 2012 wrote to memory of 3324 2012 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 30 PID 2012 wrote to memory of 3324 2012 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 30 PID 2012 wrote to memory of 3324 2012 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 30 PID 2012 wrote to memory of 3324 2012 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 30 PID 2012 wrote to memory of 3324 2012 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 30 PID 3324 wrote to memory of 3480 3324 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 31 PID 3324 wrote to memory of 3480 3324 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 31 PID 3324 wrote to memory of 3480 3324 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 31 PID 3324 wrote to memory of 3480 3324 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 31 PID 3480 wrote to memory of 3544 3480 cmd.exe 33 PID 3480 wrote to memory of 3544 3480 cmd.exe 33 PID 3480 wrote to memory of 3544 3480 cmd.exe 33 PID 3480 wrote to memory of 3544 3480 cmd.exe 33 PID 3324 wrote to memory of 3568 3324 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 34 PID 3324 wrote to memory of 3568 3324 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 34 PID 3324 wrote to memory of 3568 3324 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 34 PID 3324 wrote to memory of 3568 3324 JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe 34 PID 3568 wrote to memory of 1268 3568 micoffice.exe 35 PID 3568 wrote to memory of 1268 3568 micoffice.exe 35 PID 3568 wrote to memory of 1268 3568 micoffice.exe 35 PID 3568 wrote to memory of 1268 3568 micoffice.exe 35 PID 3568 wrote to memory of 1268 3568 micoffice.exe 35 PID 3568 wrote to memory of 1268 3568 micoffice.exe 35 PID 3568 wrote to memory of 1268 3568 micoffice.exe 35 PID 3568 wrote to memory of 1268 3568 micoffice.exe 35 PID 3568 wrote to memory of 3332 3568 micoffice.exe 36 PID 3568 wrote to memory of 3332 3568 micoffice.exe 36 PID 3568 wrote to memory of 3332 3568 micoffice.exe 36 PID 3568 wrote to memory of 3332 3568 micoffice.exe 36 PID 3568 wrote to memory of 3332 3568 micoffice.exe 36 PID 3568 wrote to memory of 3332 3568 micoffice.exe 36 PID 3568 wrote to memory of 3332 3568 micoffice.exe 36 PID 3568 wrote to memory of 3332 3568 micoffice.exe 36 PID 3568 wrote to memory of 3332 3568 micoffice.exe 36 PID 3568 wrote to memory of 3332 3568 micoffice.exe 36 PID 3568 wrote to memory of 3332 3568 micoffice.exe 36 PID 3568 wrote to memory of 3332 3568 micoffice.exe 36 PID 3568 wrote to memory of 3332 3568 micoffice.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e6440e43ad14bb92f1d20cfe352bef0.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\QVRFR.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "msoffice" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3544
-
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1268
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3332
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155B
MD5f07b93136766adced3c6f0d74d869da0
SHA1787c530f33687d758b41295e01d7a9a1bba3a467
SHA256cd603067047c028fe12d4b099d13b3681dd698d25bc32474184e9d8edd3ed701
SHA512050105a5f14939a37f653421b24959cc90cb082b20df5bb1a81335fd0ad5e70c740b43f1d6df0fc7324551425894668acc3af0c533c7d90ff149d84e844c2d10
-
Filesize
952KB
MD5be755a12716a81eb175ad7b0d0f78252
SHA1edbe61fa51e855f00ab6501ea35500c309dd4bea
SHA2561af7d28e43c94c326049c929ad8bb535dab8a4c11ba2c928a197addf9aae8945
SHA5121cd4d9004ba83c45f12ca9055fc140e33576b5361dc46d47aea71a6169d8018d6c575a813e56e74e29eb917ef9fd5934b450aa93ce4e7c61fead4a58d4b405d6