Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 08:32
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe
-
Size
952KB
-
MD5
37e53a839ded75413770cbc249d483a0
-
SHA1
15b5e21902eb5bfcfd6ea3e6045ace55a656b849
-
SHA256
391aed016c527384602911259ebaec7019d7f1ab8f262b24a0b30f3b1b5e0fab
-
SHA512
f7f4865ac0b0b6508ee8b283b66b00575dd4049d9b8346129b734cab6e2d1a27e790ee8675355493e3d6cb75af26c44e034f3304e15351c0047b71bcb729986a
-
SSDEEP
12288:byyy7Z3z4I8NXOGjwwG/ZjXsAHHz79p9NM5Tz103j2CF4TxQUOfhVPOSAE//VAci:baCI2OewFJN4mkxyHnnew1SatLRzD
Malware Config
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 3468 micoffice.exe 1508 micoffice.exe 3228 micoffice.exe -
Loads dropped DLL 7 IoCs
pid Process 3220 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 3220 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 3220 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 3220 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 3220 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 3468 micoffice.exe 3468 micoffice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\msoffice = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftOffice\\micoffice.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2228 set thread context of 3220 2228 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 30 PID 3468 set thread context of 1508 3468 micoffice.exe 35 PID 3468 set thread context of 3228 3468 micoffice.exe 36 -
resource yara_rule behavioral1/memory/3220-446-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3220-439-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3220-432-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3220-430-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3220-1038-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1508-1034-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1508-1046-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3228 micoffice.exe Token: SeSecurityPrivilege 3228 micoffice.exe Token: SeTakeOwnershipPrivilege 3228 micoffice.exe Token: SeLoadDriverPrivilege 3228 micoffice.exe Token: SeSystemProfilePrivilege 3228 micoffice.exe Token: SeSystemtimePrivilege 3228 micoffice.exe Token: SeProfSingleProcessPrivilege 3228 micoffice.exe Token: SeIncBasePriorityPrivilege 3228 micoffice.exe Token: SeCreatePagefilePrivilege 3228 micoffice.exe Token: SeBackupPrivilege 3228 micoffice.exe Token: SeRestorePrivilege 3228 micoffice.exe Token: SeShutdownPrivilege 3228 micoffice.exe Token: SeDebugPrivilege 3228 micoffice.exe Token: SeSystemEnvironmentPrivilege 3228 micoffice.exe Token: SeChangeNotifyPrivilege 3228 micoffice.exe Token: SeRemoteShutdownPrivilege 3228 micoffice.exe Token: SeUndockPrivilege 3228 micoffice.exe Token: SeManageVolumePrivilege 3228 micoffice.exe Token: SeImpersonatePrivilege 3228 micoffice.exe Token: SeCreateGlobalPrivilege 3228 micoffice.exe Token: 33 3228 micoffice.exe Token: 34 3228 micoffice.exe Token: 35 3228 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe Token: SeDebugPrivilege 1508 micoffice.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2228 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 3220 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 3468 micoffice.exe 1508 micoffice.exe 3228 micoffice.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2228 wrote to memory of 3220 2228 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 30 PID 2228 wrote to memory of 3220 2228 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 30 PID 2228 wrote to memory of 3220 2228 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 30 PID 2228 wrote to memory of 3220 2228 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 30 PID 2228 wrote to memory of 3220 2228 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 30 PID 2228 wrote to memory of 3220 2228 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 30 PID 2228 wrote to memory of 3220 2228 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 30 PID 2228 wrote to memory of 3220 2228 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 30 PID 3220 wrote to memory of 3392 3220 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 31 PID 3220 wrote to memory of 3392 3220 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 31 PID 3220 wrote to memory of 3392 3220 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 31 PID 3220 wrote to memory of 3392 3220 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 31 PID 3392 wrote to memory of 3444 3392 cmd.exe 33 PID 3392 wrote to memory of 3444 3392 cmd.exe 33 PID 3392 wrote to memory of 3444 3392 cmd.exe 33 PID 3392 wrote to memory of 3444 3392 cmd.exe 33 PID 3220 wrote to memory of 3468 3220 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 34 PID 3220 wrote to memory of 3468 3220 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 34 PID 3220 wrote to memory of 3468 3220 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 34 PID 3220 wrote to memory of 3468 3220 JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe 34 PID 3468 wrote to memory of 1508 3468 micoffice.exe 35 PID 3468 wrote to memory of 1508 3468 micoffice.exe 35 PID 3468 wrote to memory of 1508 3468 micoffice.exe 35 PID 3468 wrote to memory of 1508 3468 micoffice.exe 35 PID 3468 wrote to memory of 1508 3468 micoffice.exe 35 PID 3468 wrote to memory of 1508 3468 micoffice.exe 35 PID 3468 wrote to memory of 1508 3468 micoffice.exe 35 PID 3468 wrote to memory of 1508 3468 micoffice.exe 35 PID 3468 wrote to memory of 3228 3468 micoffice.exe 36 PID 3468 wrote to memory of 3228 3468 micoffice.exe 36 PID 3468 wrote to memory of 3228 3468 micoffice.exe 36 PID 3468 wrote to memory of 3228 3468 micoffice.exe 36 PID 3468 wrote to memory of 3228 3468 micoffice.exe 36 PID 3468 wrote to memory of 3228 3468 micoffice.exe 36 PID 3468 wrote to memory of 3228 3468 micoffice.exe 36 PID 3468 wrote to memory of 3228 3468 micoffice.exe 36 PID 3468 wrote to memory of 3228 3468 micoffice.exe 36 PID 3468 wrote to memory of 3228 3468 micoffice.exe 36 PID 3468 wrote to memory of 3228 3468 micoffice.exe 36 PID 3468 wrote to memory of 3228 3468 micoffice.exe 36 PID 3468 wrote to memory of 3228 3468 micoffice.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_37e53a839ded75413770cbc249d483a0.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\GCXBP.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "msoffice" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3444
-
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1508
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3228
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155B
MD5f07b93136766adced3c6f0d74d869da0
SHA1787c530f33687d758b41295e01d7a9a1bba3a467
SHA256cd603067047c028fe12d4b099d13b3681dd698d25bc32474184e9d8edd3ed701
SHA512050105a5f14939a37f653421b24959cc90cb082b20df5bb1a81335fd0ad5e70c740b43f1d6df0fc7324551425894668acc3af0c533c7d90ff149d84e844c2d10
-
Filesize
952KB
MD5ee9250dd78af7d7407f39999e9a39e35
SHA1ac6919a1e8f4d88ad494eae4a6d152086528f264
SHA256c9837ba9de26df05243fff17a2e3e433152748c3f30a1443274daf22d384fea8
SHA512bf9bdc3f6569d60bb74af0811d01c7b173ef05b62e7b4842c4fe08263cfba35e3eb5acefa26cd8c2dee78154d49398e1b1b4a656d3744606f929899d331895e7