Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-02-2025 22:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1cadb40bb61186f2e85313c1e96572d7.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_1cadb40bb61186f2e85313c1e96572d7.exe
-
Size
1.1MB
-
MD5
1cadb40bb61186f2e85313c1e96572d7
-
SHA1
2feebaaeffb1114f1c630139f5466b937951d17f
-
SHA256
de3665405a74bd3fd308b8831d55d8b86cd00f81126333de8dfdb9b26bc9fe4e
-
SHA512
e473b4d743072e77dc5e6ecd7bae9d51fe4cfdeb2a58fc24bbd834e9e6485dc5d4259d1530301169b8bb4e8e5ee1bcaaa141339fc43827bf2fe92ceec5c272cb
-
SSDEEP
24576:OvRkla+ipDfHGpY+7oY6A+mgzbGBUR39h/ii:2RSI/qTP6AOfTR39h/ii
Malware Config
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Extracted
darkcomet
Guest16
94.102.63.198:1742
xcb222.no-ip.org:1742
DC_MUTEX-2AXT7EA
-
gencode
ooYEEUcSXUpB
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Executes dropped EXE 2 IoCs
pid Process 2528 winupd.exe 2764 winlogon.exe -
Loads dropped DLL 3 IoCs
pid Process 2584 JaffaCakes118_1cadb40bb61186f2e85313c1e96572d7.exe 2584 JaffaCakes118_1cadb40bb61186f2e85313c1e96572d7.exe 2528 winupd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update Service = "C:\\Users\\Admin\\AppData\\winupd.exe" winupd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2528 set thread context of 2764 2528 winupd.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1cadb40bb61186f2e85313c1e96572d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2528 winupd.exe 2528 winupd.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2764 winlogon.exe Token: SeSecurityPrivilege 2764 winlogon.exe Token: SeTakeOwnershipPrivilege 2764 winlogon.exe Token: SeLoadDriverPrivilege 2764 winlogon.exe Token: SeSystemProfilePrivilege 2764 winlogon.exe Token: SeSystemtimePrivilege 2764 winlogon.exe Token: SeProfSingleProcessPrivilege 2764 winlogon.exe Token: SeIncBasePriorityPrivilege 2764 winlogon.exe Token: SeCreatePagefilePrivilege 2764 winlogon.exe Token: SeBackupPrivilege 2764 winlogon.exe Token: SeRestorePrivilege 2764 winlogon.exe Token: SeShutdownPrivilege 2764 winlogon.exe Token: SeDebugPrivilege 2764 winlogon.exe Token: SeSystemEnvironmentPrivilege 2764 winlogon.exe Token: SeChangeNotifyPrivilege 2764 winlogon.exe Token: SeRemoteShutdownPrivilege 2764 winlogon.exe Token: SeUndockPrivilege 2764 winlogon.exe Token: SeManageVolumePrivilege 2764 winlogon.exe Token: SeImpersonatePrivilege 2764 winlogon.exe Token: SeCreateGlobalPrivilege 2764 winlogon.exe Token: 33 2764 winlogon.exe Token: 34 2764 winlogon.exe Token: 35 2764 winlogon.exe Token: SeDebugPrivilege 2528 winupd.exe Token: SeDebugPrivilege 2528 winupd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2764 winlogon.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2528 2584 JaffaCakes118_1cadb40bb61186f2e85313c1e96572d7.exe 31 PID 2584 wrote to memory of 2528 2584 JaffaCakes118_1cadb40bb61186f2e85313c1e96572d7.exe 31 PID 2584 wrote to memory of 2528 2584 JaffaCakes118_1cadb40bb61186f2e85313c1e96572d7.exe 31 PID 2584 wrote to memory of 2528 2584 JaffaCakes118_1cadb40bb61186f2e85313c1e96572d7.exe 31 PID 2528 wrote to memory of 2764 2528 winupd.exe 32 PID 2528 wrote to memory of 2764 2528 winupd.exe 32 PID 2528 wrote to memory of 2764 2528 winupd.exe 32 PID 2528 wrote to memory of 2764 2528 winupd.exe 32 PID 2528 wrote to memory of 2764 2528 winupd.exe 32 PID 2528 wrote to memory of 2764 2528 winupd.exe 32 PID 2528 wrote to memory of 2764 2528 winupd.exe 32 PID 2528 wrote to memory of 2764 2528 winupd.exe 32 PID 2528 wrote to memory of 2764 2528 winupd.exe 32 PID 2528 wrote to memory of 2764 2528 winupd.exe 32 PID 2528 wrote to memory of 2764 2528 winupd.exe 32 PID 2528 wrote to memory of 2764 2528 winupd.exe 32 PID 2528 wrote to memory of 2764 2528 winupd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cadb40bb61186f2e85313c1e96572d7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1cadb40bb61186f2e85313c1e96572d7.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\winupd.exe"C:\Users\Admin\AppData\winupd.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\winlogon.exeC:\Users\Admin\AppData\Local\Temp\\winlogon.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
451KB
MD53ae6a42edbb38ce65fd8b7130c1e7fd3
SHA1194d6dd4f841ffa7787629cd1426c1b49669f445
SHA256c81c0a2b3daeb5a80644bda9faeab26357dec3e4e0256d4a0088aae8e3ad5a6f
SHA512cd80f662f6986f11b40a7c0df35e237be3e4aec033c5c71e978d064ee63e01e73603e8fc28150685786b320f48186596d04ff5e192aded2de1cfeb526ad2b64c
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2