Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2025, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_227a0f7cb2cbcd3e3de05d9547e83799.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_227a0f7cb2cbcd3e3de05d9547e83799.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_227a0f7cb2cbcd3e3de05d9547e83799.exe
-
Size
1.8MB
-
MD5
227a0f7cb2cbcd3e3de05d9547e83799
-
SHA1
5a2be3bee31db9b50e068f1f2ad7a23f92b02c31
-
SHA256
0c1f4d0d9fc0877e497c15bc89869c019a2a22ea0551af1c5a962689ca9ae328
-
SHA512
daeba0b4948687345b26bedb722a89dddb3257dbd2624bf261e478db9592e17b53f632d5401e0d72b6bc1d4bda252a502089b5665603b79e3eb23efcc4288c9e
-
SSDEEP
24576:gMC6/tIm6YL6SAhk70Trc/n6Ib6eYWxWhQU/5+eAO3gptmsNpdm0zRndLJbe7g:gM1L+S2kQTArahz5JYz77
Malware Config
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\DCSCMIN\\IMDCSC.exe" sam.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation sam.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation JaffaCakes118_227a0f7cb2cbcd3e3de05d9547e83799.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation SAMFUD.EXE -
Executes dropped EXE 4 IoCs
pid Process 4252 GR2CRYPTERBYROXAS.EXE 3956 SAMFUD.EXE 4156 sam.exe 4436 IMDCSC.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eternalspy = "C:\\Users\\Admin\\Documents\\DCSCMIN\\IMDCSC.exe" sam.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini SAMFUD.EXE File opened for modification C:\Windows\assembly\Desktop.ini SAMFUD.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly SAMFUD.EXE File created C:\Windows\assembly\Desktop.ini SAMFUD.EXE File opened for modification C:\Windows\assembly\Desktop.ini SAMFUD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_227a0f7cb2cbcd3e3de05d9547e83799.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SAMFUD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GR2CRYPTERBYROXAS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMDCSC.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 3956 SAMFUD.EXE Token: SeIncreaseQuotaPrivilege 4156 sam.exe Token: SeSecurityPrivilege 4156 sam.exe Token: SeTakeOwnershipPrivilege 4156 sam.exe Token: SeLoadDriverPrivilege 4156 sam.exe Token: SeSystemProfilePrivilege 4156 sam.exe Token: SeSystemtimePrivilege 4156 sam.exe Token: SeProfSingleProcessPrivilege 4156 sam.exe Token: SeIncBasePriorityPrivilege 4156 sam.exe Token: SeCreatePagefilePrivilege 4156 sam.exe Token: SeBackupPrivilege 4156 sam.exe Token: SeRestorePrivilege 4156 sam.exe Token: SeShutdownPrivilege 4156 sam.exe Token: SeDebugPrivilege 4156 sam.exe Token: SeSystemEnvironmentPrivilege 4156 sam.exe Token: SeChangeNotifyPrivilege 4156 sam.exe Token: SeRemoteShutdownPrivilege 4156 sam.exe Token: SeUndockPrivilege 4156 sam.exe Token: SeManageVolumePrivilege 4156 sam.exe Token: SeImpersonatePrivilege 4156 sam.exe Token: SeCreateGlobalPrivilege 4156 sam.exe Token: 33 4156 sam.exe Token: 34 4156 sam.exe Token: 35 4156 sam.exe Token: 36 4156 sam.exe Token: SeIncreaseQuotaPrivilege 4436 IMDCSC.exe Token: SeSecurityPrivilege 4436 IMDCSC.exe Token: SeTakeOwnershipPrivilege 4436 IMDCSC.exe Token: SeLoadDriverPrivilege 4436 IMDCSC.exe Token: SeSystemProfilePrivilege 4436 IMDCSC.exe Token: SeSystemtimePrivilege 4436 IMDCSC.exe Token: SeProfSingleProcessPrivilege 4436 IMDCSC.exe Token: SeIncBasePriorityPrivilege 4436 IMDCSC.exe Token: SeCreatePagefilePrivilege 4436 IMDCSC.exe Token: SeBackupPrivilege 4436 IMDCSC.exe Token: SeRestorePrivilege 4436 IMDCSC.exe Token: SeShutdownPrivilege 4436 IMDCSC.exe Token: SeDebugPrivilege 4436 IMDCSC.exe Token: SeSystemEnvironmentPrivilege 4436 IMDCSC.exe Token: SeChangeNotifyPrivilege 4436 IMDCSC.exe Token: SeRemoteShutdownPrivilege 4436 IMDCSC.exe Token: SeUndockPrivilege 4436 IMDCSC.exe Token: SeManageVolumePrivilege 4436 IMDCSC.exe Token: SeImpersonatePrivilege 4436 IMDCSC.exe Token: SeCreateGlobalPrivilege 4436 IMDCSC.exe Token: 33 4436 IMDCSC.exe Token: 34 4436 IMDCSC.exe Token: 35 4436 IMDCSC.exe Token: 36 4436 IMDCSC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4436 IMDCSC.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2748 wrote to memory of 4252 2748 JaffaCakes118_227a0f7cb2cbcd3e3de05d9547e83799.exe 84 PID 2748 wrote to memory of 4252 2748 JaffaCakes118_227a0f7cb2cbcd3e3de05d9547e83799.exe 84 PID 2748 wrote to memory of 4252 2748 JaffaCakes118_227a0f7cb2cbcd3e3de05d9547e83799.exe 84 PID 2748 wrote to memory of 3956 2748 JaffaCakes118_227a0f7cb2cbcd3e3de05d9547e83799.exe 86 PID 2748 wrote to memory of 3956 2748 JaffaCakes118_227a0f7cb2cbcd3e3de05d9547e83799.exe 86 PID 2748 wrote to memory of 3956 2748 JaffaCakes118_227a0f7cb2cbcd3e3de05d9547e83799.exe 86 PID 3956 wrote to memory of 4156 3956 SAMFUD.EXE 90 PID 3956 wrote to memory of 4156 3956 SAMFUD.EXE 90 PID 3956 wrote to memory of 4156 3956 SAMFUD.EXE 90 PID 4156 wrote to memory of 4436 4156 sam.exe 93 PID 4156 wrote to memory of 4436 4156 sam.exe 93 PID 4156 wrote to memory of 4436 4156 sam.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_227a0f7cb2cbcd3e3de05d9547e83799.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_227a0f7cb2cbcd3e3de05d9547e83799.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\GR2CRYPTERBYROXAS.EXE"C:\Users\Admin\AppData\Local\Temp\GR2CRYPTERBYROXAS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\SAMFUD.EXE"C:\Users\Admin\AppData\Local\Temp\SAMFUD.EXE"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\sam.exe"C:\Users\Admin\AppData\Local\Temp\sam.exe"3⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4436
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368KB
MD59ea1813bb9dc4305808f6fe26aa54e81
SHA183b31a029c17bc2cfb94d3d1862bc480442ba11c
SHA256c157e89aabee96d6329054a9c0a4ceec2ebc9715e8be4b50a3ff47993f2eb5e1
SHA5120a659eb6b43bf12fba632f0e0fee38c5d34cef9192b8195b207fcb303c7e9dcd649a7f330599226e4cd3f2feb9ef7cedd92802059c120a089d5dc4742203b4ea
-
Filesize
1.1MB
MD59b395f2f7145c7e8c852f4f381f1338a
SHA13e444095b362cd66d7201af1c51f67c4d64760bd
SHA25697f98c9dcbcbed1262311f6b39e756dd644c54eef7491c9c1d07aafaa072f3fb
SHA51256e115df00683fb26f3c888f2847b0f97f0cfce92122c65623dba9e58e830395ec6ac41bbe97b9d98df0ef946983290ac96beaed040b0e19a764903bd6420718
-
Filesize
658KB
MD5832e0351b142d29d19782cf0678c2d71
SHA120d138799f9bc9fe97d7e5b7af4823a9fe1ef7ec
SHA256ef6ea1abc5912fa7b98f6a597a51ffb2bf2af4e2c71cf04365b594ba36c4ccd9
SHA512d55e8f0bd98afeab322e8264c78eb251d61d9ac85f1f7adf7f09feb24434cb08ef700215672705c444c2d226705e6e28b2b4c32438bc78959c1b69232f5c7d4d