Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 23:00
Behavioral task
behavioral1
Sample
JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe
-
Size
1.2MB
-
MD5
49a345d4194d28036d1430645f7519e7
-
SHA1
bf964e926b74e3f1216ed54f69f9a7b55a9ab464
-
SHA256
904e180b5468b3c91feee425e0ebcd68b33b81ffef5ad3130aa3ab0f388d4994
-
SHA512
f83e9d1531c278910a72c9c67b9b08add1d9f20102e5dc87d233121499173e8dbc63ba182dc30587fb9c025cbb7888c2bf9c66792e64e5662dc6c05dfefb2767
-
SSDEEP
24576:QFE//Tct4bOsa1Kmk9FfceaKYaNUFAcdm12F2D024J8i6Lzsb40pfsAXu/:ySVFmk9Ffc7g+6B12O0LJ8BLzsb1pk//
Malware Config
Extracted
darkcomet
Guest16
spicitus.no-ip.biz:6112
DC_MUTEX-1140NCG
-
InstallPath
Windupdt\winupdate.exe
-
gencode
a5#e7TpR=JAu
-
install
true
-
offline_keylogger
true
-
password
1337pirat
-
persistence
true
-
reg_key
winupdater
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windupdt\\winupdate.exe" JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" winupdate.exe -
Windows security bypass 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winupdate.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winupdate.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate winupdate.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe -
Executes dropped EXE 2 IoCs
pid Process 4200 winupdate.exe 1244 winupdate.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winupdate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/5088-24-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe behavioral2/memory/4200-103-0x0000000000400000-0x00000000004E2000-memory.dmp autoit_exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\autorun.inf JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe File opened for modification F:\\autorun.inf JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe File opened for modification F:\autorun.inf winupdate.exe File opened for modification F:\\autorun.inf winupdate.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5088 set thread context of 4516 5088 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 85 PID 4200 set thread context of 1244 4200 winupdate.exe 90 -
resource yara_rule behavioral2/memory/5088-0-0x0000000000400000-0x00000000004E2000-memory.dmp upx behavioral2/files/0x000a000000023be9-22.dat upx behavioral2/memory/5088-24-0x0000000000400000-0x00000000004E2000-memory.dmp upx behavioral2/memory/4200-103-0x0000000000400000-0x00000000004E2000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 860 PING.EXE -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier winupdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 winupdate.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier winupdate.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 860 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1244 winupdate.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeSecurityPrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeTakeOwnershipPrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeLoadDriverPrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeSystemProfilePrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeSystemtimePrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeProfSingleProcessPrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeIncBasePriorityPrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeCreatePagefilePrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeBackupPrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeRestorePrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeShutdownPrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeDebugPrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeSystemEnvironmentPrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeChangeNotifyPrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeRemoteShutdownPrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeUndockPrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeManageVolumePrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeImpersonatePrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeCreateGlobalPrivilege 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: 33 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: 34 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: 35 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: 36 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe Token: SeIncreaseQuotaPrivilege 1244 winupdate.exe Token: SeSecurityPrivilege 1244 winupdate.exe Token: SeTakeOwnershipPrivilege 1244 winupdate.exe Token: SeLoadDriverPrivilege 1244 winupdate.exe Token: SeSystemProfilePrivilege 1244 winupdate.exe Token: SeSystemtimePrivilege 1244 winupdate.exe Token: SeProfSingleProcessPrivilege 1244 winupdate.exe Token: SeIncBasePriorityPrivilege 1244 winupdate.exe Token: SeCreatePagefilePrivilege 1244 winupdate.exe Token: SeBackupPrivilege 1244 winupdate.exe Token: SeRestorePrivilege 1244 winupdate.exe Token: SeShutdownPrivilege 1244 winupdate.exe Token: SeDebugPrivilege 1244 winupdate.exe Token: SeSystemEnvironmentPrivilege 1244 winupdate.exe Token: SeChangeNotifyPrivilege 1244 winupdate.exe Token: SeRemoteShutdownPrivilege 1244 winupdate.exe Token: SeUndockPrivilege 1244 winupdate.exe Token: SeManageVolumePrivilege 1244 winupdate.exe Token: SeImpersonatePrivilege 1244 winupdate.exe Token: SeCreateGlobalPrivilege 1244 winupdate.exe Token: 33 1244 winupdate.exe Token: 34 1244 winupdate.exe Token: 35 1244 winupdate.exe Token: 36 1244 winupdate.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1244 winupdate.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 5088 wrote to memory of 4516 5088 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 85 PID 5088 wrote to memory of 4516 5088 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 85 PID 5088 wrote to memory of 4516 5088 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 85 PID 5088 wrote to memory of 4516 5088 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 85 PID 5088 wrote to memory of 4516 5088 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 85 PID 5088 wrote to memory of 4516 5088 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 85 PID 5088 wrote to memory of 4516 5088 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 85 PID 5088 wrote to memory of 4516 5088 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 85 PID 5088 wrote to memory of 4516 5088 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 85 PID 5088 wrote to memory of 4516 5088 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 85 PID 5088 wrote to memory of 4516 5088 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 85 PID 4516 wrote to memory of 4200 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 87 PID 4516 wrote to memory of 4200 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 87 PID 4516 wrote to memory of 4200 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 87 PID 4516 wrote to memory of 4104 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 88 PID 4516 wrote to memory of 4104 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 88 PID 4516 wrote to memory of 4104 4516 JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe 88 PID 4200 wrote to memory of 1244 4200 winupdate.exe 90 PID 4200 wrote to memory of 1244 4200 winupdate.exe 90 PID 4200 wrote to memory of 1244 4200 winupdate.exe 90 PID 4200 wrote to memory of 1244 4200 winupdate.exe 90 PID 4200 wrote to memory of 1244 4200 winupdate.exe 90 PID 4200 wrote to memory of 1244 4200 winupdate.exe 90 PID 4200 wrote to memory of 1244 4200 winupdate.exe 90 PID 4200 wrote to memory of 1244 4200 winupdate.exe 90 PID 4200 wrote to memory of 1244 4200 winupdate.exe 90 PID 4200 wrote to memory of 1244 4200 winupdate.exe 90 PID 4200 wrote to memory of 1244 4200 winupdate.exe 90 PID 4104 wrote to memory of 860 4104 cmd.exe 92 PID 4104 wrote to memory of 860 4104 cmd.exe 92 PID 4104 wrote to memory of 860 4104 cmd.exe 92 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion winupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" winupdate.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe"1⤵
- Drops autorun.inf file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49a345d4194d28036d1430645f7519e7.exe"2⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windupdt\winupdate.exe"C:\Windupdt\winupdate.exe"3⤵
- Executes dropped EXE
- Drops autorun.inf file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windupdt\winupdate.exe"C:\Windupdt\winupdate.exe"4⤵
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Checks BIOS information in registry
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_dcsc_.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:860
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119B
MD5a8994260fb8468e566f3a20f64167443
SHA13028893b7ac721be1faaae42f137a5e0a7f360ef
SHA25628591956fa6493b76974639a3cb43850f07e11160be627d2ef0510ea038a10b6
SHA512df6f992ca89c5f502224c06c3bacbcc11a01a8b9331ac9082c19ab62866dbb37f69ce81ecc4e958cd3ba313773afbd980970ae8ccb5a7a32b8d0f4da372aceb2
-
Filesize
746KB
MD5189d8cd142c38e4ba8aa10f5f0001e02
SHA18eca58c6852f69dbcb09e3f412e210a083400cec
SHA256cc27b9e8f3eb40ecbaa588a9ff195f96ec9456229c0a3baa0ee93e055e148c90
SHA5126a8974317ddde52ddfbd0d0265c9df44644058ddcbbebbe33aa195c810e1905ef5a73b64f16ad4a33486a35d4925b14f753f6ebb6043ea0cc2ca8899bd62d309
-
Filesize
1.2MB
MD549a345d4194d28036d1430645f7519e7
SHA1bf964e926b74e3f1216ed54f69f9a7b55a9ab464
SHA256904e180b5468b3c91feee425e0ebcd68b33b81ffef5ad3130aa3ab0f388d4994
SHA512f83e9d1531c278910a72c9c67b9b08add1d9f20102e5dc87d233121499173e8dbc63ba182dc30587fb9c025cbb7888c2bf9c66792e64e5662dc6c05dfefb2767
-
Filesize
379B
MD5761cb1a03192b38ed9dff98815989aba
SHA1ae0e079be3bfa3146736105b034630891142dae3
SHA256d6f8e2528f13568bb38f060e32f0d0c3db343be53c91049aa6d26617953d2e9f
SHA512a4328bd1a881ab8ec5fc8410b67e43ad97e9a2e950ee823fb663d75be776f28158e133b4720414a6120e55241fe9b2741d96d7a6243c6df4d8769efe31883864