Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/02/2025, 03:17
Behavioral task
behavioral1
Sample
JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe
-
Size
658KB
-
MD5
1e24aa8195240fba9ea4e28a8e105c50
-
SHA1
c17f1c94d98cbade1b7fe6dbb556c876457e8add
-
SHA256
307eca1f4c40b1473f42ef50b9a00a1f899316246e59f5ffb3136671dd147243
-
SHA512
c39c961fa3a90c2c94aa21b5e1d47b30dc3552d8f73b42bf76c300dc61e230f161823cacd44c38132b11bbd894c2dd1d9c95ce54000d157aac7b9020c16f5e35
-
SSDEEP
12288:q9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hw:mZ1xuVVjfFoynPaVBUR8f+kN10EBG
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-HQ6WCHA
-
gencode
1Px6GGRMCbys
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeSecurityPrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeTakeOwnershipPrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeLoadDriverPrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeSystemProfilePrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeSystemtimePrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeProfSingleProcessPrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeIncBasePriorityPrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeCreatePagefilePrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeBackupPrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeRestorePrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeShutdownPrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeDebugPrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeSystemEnvironmentPrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeChangeNotifyPrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeRemoteShutdownPrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeUndockPrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeManageVolumePrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeImpersonatePrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: SeCreateGlobalPrivilege 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: 33 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: 34 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe Token: 35 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2128 JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e24aa8195240fba9ea4e28a8e105c50.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2128