Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2025, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7fb215db072c4d8e1a4c03595ae96565.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_7fb215db072c4d8e1a4c03595ae96565.exe
-
Size
1.1MB
-
MD5
7fb215db072c4d8e1a4c03595ae96565
-
SHA1
799d1ff4580ffdb006f6e22cd65cc06df7bcc56f
-
SHA256
23ff7de42ea09c954f36e8554632547c3365fe821e11bb1eac061e1115ba15d4
-
SHA512
751e4fbda1270a5ccdc90eab5a4a85c47ee12f7f6b3a02438eb20f23d87b7f7f55407899f8b422a705e1460ca821a0bf28f5d61bfd02a60abe2ed58878dc4752
-
SSDEEP
24576:tPGSY91VwNJcFMqTNnmJa4dMyMPy+mfeK15bSlC+3keG0q:1GJyV28KWfecFS9dG0q
Malware Config
Extracted
darkcomet
Guest16
myhost20.no-ip.biz:82
DC_MUTEX-RCW2VGW
-
gencode
Xrr0dLuwBjSo
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile Server.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "1" Server.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" Server.exe -
Windows security bypass 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" explorer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Server.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation Server.exe -
Executes dropped EXE 3 IoCs
pid Process 3284 7za.exe 3048 Server.exe 5584 RUNESCAPE_PIN_GENERATOR.EXE -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Server.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3048 set thread context of 3692 3048 Server.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7fb215db072c4d8e1a4c03595ae96565.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RUNESCAPE_PIN_GENERATOR.EXE -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Server.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Server.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Server.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Server.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Server.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3048 Server.exe Token: SeSecurityPrivilege 3048 Server.exe Token: SeTakeOwnershipPrivilege 3048 Server.exe Token: SeLoadDriverPrivilege 3048 Server.exe Token: SeSystemProfilePrivilege 3048 Server.exe Token: SeSystemtimePrivilege 3048 Server.exe Token: SeProfSingleProcessPrivilege 3048 Server.exe Token: SeIncBasePriorityPrivilege 3048 Server.exe Token: SeCreatePagefilePrivilege 3048 Server.exe Token: SeBackupPrivilege 3048 Server.exe Token: SeRestorePrivilege 3048 Server.exe Token: SeShutdownPrivilege 3048 Server.exe Token: SeDebugPrivilege 3048 Server.exe Token: SeSystemEnvironmentPrivilege 3048 Server.exe Token: SeChangeNotifyPrivilege 3048 Server.exe Token: SeRemoteShutdownPrivilege 3048 Server.exe Token: SeUndockPrivilege 3048 Server.exe Token: SeManageVolumePrivilege 3048 Server.exe Token: SeImpersonatePrivilege 3048 Server.exe Token: SeCreateGlobalPrivilege 3048 Server.exe Token: 33 3048 Server.exe Token: 34 3048 Server.exe Token: 35 3048 Server.exe Token: 36 3048 Server.exe Token: SeIncreaseQuotaPrivilege 3692 explorer.exe Token: SeSecurityPrivilege 3692 explorer.exe Token: SeTakeOwnershipPrivilege 3692 explorer.exe Token: SeLoadDriverPrivilege 3692 explorer.exe Token: SeSystemProfilePrivilege 3692 explorer.exe Token: SeSystemtimePrivilege 3692 explorer.exe Token: SeProfSingleProcessPrivilege 3692 explorer.exe Token: SeIncBasePriorityPrivilege 3692 explorer.exe Token: SeCreatePagefilePrivilege 3692 explorer.exe Token: SeBackupPrivilege 3692 explorer.exe Token: SeRestorePrivilege 3692 explorer.exe Token: SeShutdownPrivilege 3692 explorer.exe Token: SeDebugPrivilege 3692 explorer.exe Token: SeSystemEnvironmentPrivilege 3692 explorer.exe Token: SeChangeNotifyPrivilege 3692 explorer.exe Token: SeRemoteShutdownPrivilege 3692 explorer.exe Token: SeUndockPrivilege 3692 explorer.exe Token: SeManageVolumePrivilege 3692 explorer.exe Token: SeImpersonatePrivilege 3692 explorer.exe Token: SeCreateGlobalPrivilege 3692 explorer.exe Token: 33 3692 explorer.exe Token: 34 3692 explorer.exe Token: 35 3692 explorer.exe Token: 36 3692 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3692 explorer.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3236 wrote to memory of 3780 3236 JaffaCakes118_7fb215db072c4d8e1a4c03595ae96565.exe 88 PID 3236 wrote to memory of 3780 3236 JaffaCakes118_7fb215db072c4d8e1a4c03595ae96565.exe 88 PID 3236 wrote to memory of 3780 3236 JaffaCakes118_7fb215db072c4d8e1a4c03595ae96565.exe 88 PID 3780 wrote to memory of 3284 3780 cmd.exe 90 PID 3780 wrote to memory of 3284 3780 cmd.exe 90 PID 3780 wrote to memory of 3284 3780 cmd.exe 90 PID 3236 wrote to memory of 3048 3236 JaffaCakes118_7fb215db072c4d8e1a4c03595ae96565.exe 91 PID 3236 wrote to memory of 3048 3236 JaffaCakes118_7fb215db072c4d8e1a4c03595ae96565.exe 91 PID 3236 wrote to memory of 3048 3236 JaffaCakes118_7fb215db072c4d8e1a4c03595ae96565.exe 91 PID 3048 wrote to memory of 5584 3048 Server.exe 92 PID 3048 wrote to memory of 5584 3048 Server.exe 92 PID 3048 wrote to memory of 5584 3048 Server.exe 92 PID 3048 wrote to memory of 3692 3048 Server.exe 93 PID 3048 wrote to memory of 3692 3048 Server.exe 93 PID 3048 wrote to memory of 3692 3048 Server.exe 93 PID 3048 wrote to memory of 3692 3048 Server.exe 93 PID 3048 wrote to memory of 3692 3048 Server.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7fb215db072c4d8e1a4c03595ae96565.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7fb215db072c4d8e1a4c03595ae96565.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\7za.exe" "x" "-y" "C:\Users\Admin\AppData\Roaming\Server.7z" "-pSaltyDave""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Roaming\7za.exe"C:\Users\Admin\AppData\Roaming\7za.exe" "x" "-y" "C:\Users\Admin\AppData\Roaming\Server.7z" "-pSaltyDave"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3284
-
-
-
C:\Users\Admin\AppData\Roaming\Server.exeC:\Users\Admin\AppData\Roaming\Server.exe2⤵
- Modifies firewall policy service
- Windows security bypass
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\RUNESCAPE_PIN_GENERATOR.EXE"C:\Users\Admin\AppData\Local\Temp\RUNESCAPE_PIN_GENERATOR.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5584
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Modifies firewall policy service
- Windows security bypass
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5846e1b7dc70458fb6ed3c4d6e142a37b
SHA15cdd0bfab5d2eae9024108351ded70cf9cd9a6dc
SHA25688b405cce56c850876746b98b31c2cfcf5f45fe1c985b2b07dedbb5a857ea5c3
SHA51239246e3530e71064c113c8b9ba37d65612ad25cc68eb8311f492165a6ae5a309959c428bc337932b9f2ccf71ef17f51666fae05dd56f5f2209acf236663ddf79
-
Filesize
652KB
MD521ddba4127fe33445b8b7507c50bb0ee
SHA10c19546e23a30ffed0adc2d025962632fffd459a
SHA256c9107a0eb531e41fa3f8dc2d0ab6f1a7eed06152c7b294034da71cb7b479ea21
SHA51271cbd6a274a00ff8486eae6adde4a822bfdb511142778ddaa0a0313b8838dffc7203e58db8ac9b8e8519083321c5f2c901c50f4c7a887f91789c78de67a40449
-
Filesize
574KB
MD542badc1d2f03a8b1e4875740d3d49336
SHA1cee178da1fb05f99af7a3547093122893bd1eb46
SHA256c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf
SHA5126bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c
-
Filesize
236KB
MD5a898d62a3224792a3bf07e86e0a2f77a
SHA13d5d1b76b045a94c562a38948478208ab75b122e
SHA256cfe4088808961634966dd549829b24cb699c4de254de5c128dd84928ad66e151
SHA51217fd8c4eb4368ed057ea94eb2cb988c9a79a40458ab57d4e289d231c6aa66a5960d04f22d787a1df77e687fd8bc106a776f416fa2505fb0a4333796c717d4c35