Analysis
-
max time kernel
150s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22/02/2025, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe
-
Size
724KB
-
MD5
1b9d7f04abc6a3992f08a4c62ed944b3
-
SHA1
4aa6645f26ebd195583f37fb13fe618554eb70d6
-
SHA256
dadfa0bfe4c53fae9768297c502304de283e561d7effcabb120804a9b50c1549
-
SHA512
48417d024c591663b5dd10dcfeabf16325c74a43dd604d99f20ea8f128072661b47e4883133c6618a6865fef68760557a5772ef925c331457c94bd0e4eefdec3
-
SSDEEP
12288:XIKdPItymJ78JYSAEzeOhpiqqFf609uQbSflqjZN7NfXFffa2KqSkTJD:XIePqNgze210EQbSsf91flHD
Malware Config
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Extracted
darkcomet
Crypter1
127.0.0.1:95
DC_MUTEX-LN9GR17
-
gencode
vWsjmZp2wpBg
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2672 attrib.exe 2688 attrib.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2336 set thread context of 2880 2336 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeSecurityPrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeTakeOwnershipPrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeLoadDriverPrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeSystemProfilePrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeSystemtimePrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeProfSingleProcessPrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeIncBasePriorityPrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeCreatePagefilePrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeBackupPrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeRestorePrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeShutdownPrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeDebugPrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeSystemEnvironmentPrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeChangeNotifyPrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeRemoteShutdownPrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeUndockPrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeManageVolumePrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeImpersonatePrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: SeCreateGlobalPrivilege 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: 33 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: 34 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe Token: 35 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2880 2336 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 29 PID 2336 wrote to memory of 2880 2336 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 29 PID 2336 wrote to memory of 2880 2336 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 29 PID 2336 wrote to memory of 2880 2336 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 29 PID 2336 wrote to memory of 2880 2336 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 29 PID 2336 wrote to memory of 2880 2336 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 29 PID 2336 wrote to memory of 2880 2336 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 29 PID 2336 wrote to memory of 2880 2336 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 29 PID 2336 wrote to memory of 2880 2336 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 29 PID 2336 wrote to memory of 2880 2336 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 29 PID 2336 wrote to memory of 2880 2336 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 29 PID 2336 wrote to memory of 2880 2336 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 29 PID 2880 wrote to memory of 2960 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 30 PID 2880 wrote to memory of 2960 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 30 PID 2880 wrote to memory of 2960 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 30 PID 2880 wrote to memory of 2960 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 30 PID 2880 wrote to memory of 2812 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 31 PID 2880 wrote to memory of 2812 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 31 PID 2880 wrote to memory of 2812 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 31 PID 2880 wrote to memory of 2812 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 31 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2880 wrote to memory of 3048 2880 JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe 32 PID 2960 wrote to memory of 2672 2960 cmd.exe 35 PID 2960 wrote to memory of 2672 2960 cmd.exe 35 PID 2960 wrote to memory of 2672 2960 cmd.exe 35 PID 2960 wrote to memory of 2672 2960 cmd.exe 35 PID 2812 wrote to memory of 2688 2812 cmd.exe 36 PID 2812 wrote to memory of 2688 2812 cmd.exe 36 PID 2812 wrote to memory of 2688 2812 cmd.exe 36 PID 2812 wrote to memory of 2688 2812 cmd.exe 36 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2672 attrib.exe 2688 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b9d7f04abc6a3992f08a4c62ed944b3.exe" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2688
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
- System Location Discovery: System Language Discovery
PID:3048
-
-