Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/02/2025, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_33dc3245667316baa6718526b8378920.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_33dc3245667316baa6718526b8378920.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_33dc3245667316baa6718526b8378920.exe
-
Size
738KB
-
MD5
33dc3245667316baa6718526b8378920
-
SHA1
e3a33ca4dd8e7c20e1dc38239bb94b341882209d
-
SHA256
99b5eef629934b4c61bb544f3ac52c6d8e6c7d4f8dcdff2b4c0f68bce95ac968
-
SHA512
91aef173732e91a0cd6e70ed89981a741cb0b0a47c4341612633cd32a81c8d30367cfd9d374e079ed825ff85cee455f87c0c9f1c987a9cea4eaaa5d5ceca405f
-
SSDEEP
12288:S9hV3300UaiqLQU7hhTRBYvmTAJ6YzdvmIeWZPsW1BHC2AKa2SQWfDFq4:SJ3jiMPthTwe0nOWZzRm/QWfBf
Malware Config
Extracted
darkcomet
ZADROT
hostingari.no-ip.biz:1604
DC_MUTEX-BM29NLU
-
InstallPath
MSDCSC\tasking.exe
-
gencode
HWazmVjcXfRl
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\tasking.exe" JaffaCakes118_33dc3245667316baa6718526b8378920.exe -
Executes dropped EXE 2 IoCs
pid Process 2408 tasking.exe 1728 tasking.exe -
Loads dropped DLL 7 IoCs
pid Process 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\tasking.exe" JaffaCakes118_33dc3245667316baa6718526b8378920.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2260 set thread context of 1668 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 28 PID 2408 set thread context of 1728 2408 tasking.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3016 2260 WerFault.exe 27 2732 2408 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_33dc3245667316baa6718526b8378920.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_33dc3245667316baa6718526b8378920.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasking.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasking.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeSecurityPrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeTakeOwnershipPrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeLoadDriverPrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeSystemProfilePrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeSystemtimePrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeProfSingleProcessPrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeIncBasePriorityPrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeCreatePagefilePrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeBackupPrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeRestorePrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeShutdownPrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeDebugPrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeSystemEnvironmentPrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeChangeNotifyPrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeRemoteShutdownPrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeUndockPrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeManageVolumePrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeImpersonatePrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeCreateGlobalPrivilege 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: 33 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: 34 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: 35 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe Token: SeIncreaseQuotaPrivilege 1728 tasking.exe Token: SeSecurityPrivilege 1728 tasking.exe Token: SeTakeOwnershipPrivilege 1728 tasking.exe Token: SeLoadDriverPrivilege 1728 tasking.exe Token: SeSystemProfilePrivilege 1728 tasking.exe Token: SeSystemtimePrivilege 1728 tasking.exe Token: SeProfSingleProcessPrivilege 1728 tasking.exe Token: SeIncBasePriorityPrivilege 1728 tasking.exe Token: SeCreatePagefilePrivilege 1728 tasking.exe Token: SeBackupPrivilege 1728 tasking.exe Token: SeRestorePrivilege 1728 tasking.exe Token: SeShutdownPrivilege 1728 tasking.exe Token: SeDebugPrivilege 1728 tasking.exe Token: SeSystemEnvironmentPrivilege 1728 tasking.exe Token: SeChangeNotifyPrivilege 1728 tasking.exe Token: SeRemoteShutdownPrivilege 1728 tasking.exe Token: SeUndockPrivilege 1728 tasking.exe Token: SeManageVolumePrivilege 1728 tasking.exe Token: SeImpersonatePrivilege 1728 tasking.exe Token: SeCreateGlobalPrivilege 1728 tasking.exe Token: 33 1728 tasking.exe Token: 34 1728 tasking.exe Token: 35 1728 tasking.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 2408 tasking.exe 1728 tasking.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2260 wrote to memory of 1668 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 28 PID 2260 wrote to memory of 1668 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 28 PID 2260 wrote to memory of 1668 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 28 PID 2260 wrote to memory of 1668 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 28 PID 2260 wrote to memory of 1668 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 28 PID 2260 wrote to memory of 1668 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 28 PID 2260 wrote to memory of 1668 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 28 PID 2260 wrote to memory of 1668 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 28 PID 2260 wrote to memory of 1668 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 28 PID 2260 wrote to memory of 1668 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 28 PID 2260 wrote to memory of 1668 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 28 PID 2260 wrote to memory of 1668 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 28 PID 2260 wrote to memory of 1668 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 28 PID 2260 wrote to memory of 3016 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 29 PID 2260 wrote to memory of 3016 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 29 PID 2260 wrote to memory of 3016 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 29 PID 2260 wrote to memory of 3016 2260 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 29 PID 1668 wrote to memory of 2408 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 32 PID 1668 wrote to memory of 2408 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 32 PID 1668 wrote to memory of 2408 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 32 PID 1668 wrote to memory of 2408 1668 JaffaCakes118_33dc3245667316baa6718526b8378920.exe 32 PID 2408 wrote to memory of 1728 2408 tasking.exe 33 PID 2408 wrote to memory of 1728 2408 tasking.exe 33 PID 2408 wrote to memory of 1728 2408 tasking.exe 33 PID 2408 wrote to memory of 1728 2408 tasking.exe 33 PID 2408 wrote to memory of 1728 2408 tasking.exe 33 PID 2408 wrote to memory of 1728 2408 tasking.exe 33 PID 2408 wrote to memory of 1728 2408 tasking.exe 33 PID 2408 wrote to memory of 1728 2408 tasking.exe 33 PID 2408 wrote to memory of 1728 2408 tasking.exe 33 PID 2408 wrote to memory of 1728 2408 tasking.exe 33 PID 2408 wrote to memory of 1728 2408 tasking.exe 33 PID 2408 wrote to memory of 1728 2408 tasking.exe 33 PID 2408 wrote to memory of 1728 2408 tasking.exe 33 PID 2408 wrote to memory of 2732 2408 tasking.exe 34 PID 2408 wrote to memory of 2732 2408 tasking.exe 34 PID 2408 wrote to memory of 2732 2408 tasking.exe 34 PID 2408 wrote to memory of 2732 2408 tasking.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_33dc3245667316baa6718526b8378920.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_33dc3245667316baa6718526b8378920.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_33dc3245667316baa6718526b8378920.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_33dc3245667316baa6718526b8378920.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\Documents\MSDCSC\tasking.exe"C:\Users\Admin\Documents\MSDCSC\tasking.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\Documents\MSDCSC\tasking.exe"C:\Users\Admin\Documents\MSDCSC\tasking.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 1924⤵
- Loads dropped DLL
- Program crash
PID:2732
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 1922⤵
- Program crash
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
738KB
MD533dc3245667316baa6718526b8378920
SHA1e3a33ca4dd8e7c20e1dc38239bb94b341882209d
SHA25699b5eef629934b4c61bb544f3ac52c6d8e6c7d4f8dcdff2b4c0f68bce95ac968
SHA51291aef173732e91a0cd6e70ed89981a741cb0b0a47c4341612633cd32a81c8d30367cfd9d374e079ed825ff85cee455f87c0c9f1c987a9cea4eaaa5d5ceca405f