Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe
-
Size
952KB
-
MD5
3837dcba807124b611190bf4bbcb2050
-
SHA1
6fef395738ae54ce4cdac5b2771c67f769c79fff
-
SHA256
6c445db3a555178391b3f09964b7d53bb5708ebadb762681b5dce0620795746d
-
SHA512
23152d743b7755da8a037b675227e29556dc116d23867d76e818aa034d0d377778e54c1b51ceed99be07f515c1d20728761aba948bbdd18c3c2587bff01f7fc9
-
SSDEEP
12288:byyy7Z3z4I8NXOGjwwG/ZjXsAHHz79p9NM5Tz103j2CF4TxQUOfhVPOSAE//VAci:baCI2OewFJN4mkxyHnnew1SatLRzD
Malware Config
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 2996 micoffice.exe 1440 micoffice.exe 1084 micoffice.exe -
Loads dropped DLL 7 IoCs
pid Process 3020 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 3020 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 3020 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 3020 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 3020 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 2996 micoffice.exe 2996 micoffice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\msoffice = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftOffice\\micoffice.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1804 set thread context of 3020 1804 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 30 PID 2996 set thread context of 1440 2996 micoffice.exe 35 PID 2996 set thread context of 1084 2996 micoffice.exe 36 -
resource yara_rule behavioral1/memory/3020-445-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1440-883-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3020-1038-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1440-1044-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1084 micoffice.exe Token: SeSecurityPrivilege 1084 micoffice.exe Token: SeTakeOwnershipPrivilege 1084 micoffice.exe Token: SeLoadDriverPrivilege 1084 micoffice.exe Token: SeSystemProfilePrivilege 1084 micoffice.exe Token: SeSystemtimePrivilege 1084 micoffice.exe Token: SeProfSingleProcessPrivilege 1084 micoffice.exe Token: SeIncBasePriorityPrivilege 1084 micoffice.exe Token: SeCreatePagefilePrivilege 1084 micoffice.exe Token: SeBackupPrivilege 1084 micoffice.exe Token: SeRestorePrivilege 1084 micoffice.exe Token: SeShutdownPrivilege 1084 micoffice.exe Token: SeDebugPrivilege 1084 micoffice.exe Token: SeSystemEnvironmentPrivilege 1084 micoffice.exe Token: SeChangeNotifyPrivilege 1084 micoffice.exe Token: SeRemoteShutdownPrivilege 1084 micoffice.exe Token: SeUndockPrivilege 1084 micoffice.exe Token: SeManageVolumePrivilege 1084 micoffice.exe Token: SeImpersonatePrivilege 1084 micoffice.exe Token: SeCreateGlobalPrivilege 1084 micoffice.exe Token: 33 1084 micoffice.exe Token: 34 1084 micoffice.exe Token: 35 1084 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe Token: SeDebugPrivilege 1440 micoffice.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1804 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 3020 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 2996 micoffice.exe 1440 micoffice.exe 1084 micoffice.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1804 wrote to memory of 3020 1804 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 30 PID 1804 wrote to memory of 3020 1804 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 30 PID 1804 wrote to memory of 3020 1804 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 30 PID 1804 wrote to memory of 3020 1804 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 30 PID 1804 wrote to memory of 3020 1804 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 30 PID 1804 wrote to memory of 3020 1804 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 30 PID 1804 wrote to memory of 3020 1804 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 30 PID 1804 wrote to memory of 3020 1804 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 30 PID 3020 wrote to memory of 2784 3020 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 31 PID 3020 wrote to memory of 2784 3020 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 31 PID 3020 wrote to memory of 2784 3020 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 31 PID 3020 wrote to memory of 2784 3020 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 31 PID 2784 wrote to memory of 1696 2784 cmd.exe 33 PID 2784 wrote to memory of 1696 2784 cmd.exe 33 PID 2784 wrote to memory of 1696 2784 cmd.exe 33 PID 2784 wrote to memory of 1696 2784 cmd.exe 33 PID 3020 wrote to memory of 2996 3020 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 34 PID 3020 wrote to memory of 2996 3020 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 34 PID 3020 wrote to memory of 2996 3020 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 34 PID 3020 wrote to memory of 2996 3020 JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe 34 PID 2996 wrote to memory of 1440 2996 micoffice.exe 35 PID 2996 wrote to memory of 1440 2996 micoffice.exe 35 PID 2996 wrote to memory of 1440 2996 micoffice.exe 35 PID 2996 wrote to memory of 1440 2996 micoffice.exe 35 PID 2996 wrote to memory of 1440 2996 micoffice.exe 35 PID 2996 wrote to memory of 1440 2996 micoffice.exe 35 PID 2996 wrote to memory of 1440 2996 micoffice.exe 35 PID 2996 wrote to memory of 1440 2996 micoffice.exe 35 PID 2996 wrote to memory of 1084 2996 micoffice.exe 36 PID 2996 wrote to memory of 1084 2996 micoffice.exe 36 PID 2996 wrote to memory of 1084 2996 micoffice.exe 36 PID 2996 wrote to memory of 1084 2996 micoffice.exe 36 PID 2996 wrote to memory of 1084 2996 micoffice.exe 36 PID 2996 wrote to memory of 1084 2996 micoffice.exe 36 PID 2996 wrote to memory of 1084 2996 micoffice.exe 36 PID 2996 wrote to memory of 1084 2996 micoffice.exe 36 PID 2996 wrote to memory of 1084 2996 micoffice.exe 36 PID 2996 wrote to memory of 1084 2996 micoffice.exe 36 PID 2996 wrote to memory of 1084 2996 micoffice.exe 36 PID 2996 wrote to memory of 1084 2996 micoffice.exe 36 PID 2996 wrote to memory of 1084 2996 micoffice.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3837dcba807124b611190bf4bbcb2050.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DULAK.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "msoffice" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1696
-
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1440
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1084
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155B
MD5f07b93136766adced3c6f0d74d869da0
SHA1787c530f33687d758b41295e01d7a9a1bba3a467
SHA256cd603067047c028fe12d4b099d13b3681dd698d25bc32474184e9d8edd3ed701
SHA512050105a5f14939a37f653421b24959cc90cb082b20df5bb1a81335fd0ad5e70c740b43f1d6df0fc7324551425894668acc3af0c533c7d90ff149d84e844c2d10
-
Filesize
952KB
MD56fa4b38a5dcaae0d08985ef746fc8c17
SHA1cf24341f03a9e8d3267888e463033d5cf65e7cbe
SHA256ac43f0b16b799c0e18179fdf753a662340f137196b752fa5637fd52bfb6c5a8f
SHA5129fd8ee7a699cbb343e0bf5dc49ca481f5698232eef298838c674fb5ef86cd61d7335910634d8b2e0cf8423e916f1f60bc279a934abe84742c526268220ddd2eb