Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/03/2025, 20:05
Behavioral task
behavioral1
Sample
JaffaCakes118_77c2a1bcb08f77dd1716b3ea5ec67445.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_77c2a1bcb08f77dd1716b3ea5ec67445.exe
-
Size
635KB
-
MD5
77c2a1bcb08f77dd1716b3ea5ec67445
-
SHA1
274e9ef34bf7155d764f05f1135fd6dd5a4ce371
-
SHA256
88578732fb5742287bee43d6fd2db98053e292811173a3bb5947d3c00b0cdd22
-
SHA512
7a8de18a50c3da856e83fb7bb4d3159a4ebe823ceba5be1e40b1e1303e005989847574dc79b6a9c7951e34c2878a1784aa827ff3f9026cd70b10e4f244638a28
-
SSDEEP
12288:gpwABK90BOeFx9lPAYvxPQVjdsAY2XjWlnlpTMMXG91uhKIXn/L:awAcuz9lPzvxP+Bsz2XjWTRMQckkIXnz
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-F54S21D
-
gencode
FA�o1KhH/jbF
-
install
false
-
offline_keylogger
false
-
persistence
false
Signatures
-
Darkcomet family
-
Program crash 1 IoCs
pid pid_target Process procid_target 2792 2112 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_77c2a1bcb08f77dd1716b3ea5ec67445.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2792 2112 JaffaCakes118_77c2a1bcb08f77dd1716b3ea5ec67445.exe 31 PID 2112 wrote to memory of 2792 2112 JaffaCakes118_77c2a1bcb08f77dd1716b3ea5ec67445.exe 31 PID 2112 wrote to memory of 2792 2112 JaffaCakes118_77c2a1bcb08f77dd1716b3ea5ec67445.exe 31 PID 2112 wrote to memory of 2792 2112 JaffaCakes118_77c2a1bcb08f77dd1716b3ea5ec67445.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77c2a1bcb08f77dd1716b3ea5ec67445.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_77c2a1bcb08f77dd1716b3ea5ec67445.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 3322⤵
- Program crash
PID:2792
-