Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2025, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe
-
Size
608KB
-
MD5
82270aed949bda6503b1d0874a97a63b
-
SHA1
805e505169f34b2bf629f33fad0c38c6290e6af5
-
SHA256
f4cdf2802cab61411b1e2ccfd2059a48c98ccac2c9cecbd50431ab5c5f7664ed
-
SHA512
ecbc8d82ac578de53f30becde9273c83777cf893ea07f85d6710bb909ec9073dfd01c9ca2c9d7c03d10618ff7b2f4c4d10f09a156f8a3e34f20cdb51dec51af2
-
SSDEEP
12288:2RFj6uJsOFvz1ABs83aaAbhzANOF2+ZkzDolKS2gDFZofGZCC5fFQY:ZujvznbhkNeUolKS2g5/CCl
Malware Config
Extracted
darkcomet
Guest16
chitan.myftp.org:1604
DC_MUTEX-B1N7QHH
-
gencode
jGCG#1SnUzAK
-
install
false
-
offline_keylogger
false
-
password
hakima
-
persistence
false
Signatures
-
Darkcomet family
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe -
Windows security bypass 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 5972 attrib.exe 1272 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe -
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
resource yara_rule behavioral2/memory/4528-6-0x0000000000400000-0x00000000004F5000-memory.dmp molebox -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeSecurityPrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeTakeOwnershipPrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeLoadDriverPrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeSystemProfilePrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeSystemtimePrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeProfSingleProcessPrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeIncBasePriorityPrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeCreatePagefilePrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeBackupPrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeRestorePrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeShutdownPrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeDebugPrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeSystemEnvironmentPrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeChangeNotifyPrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeRemoteShutdownPrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeUndockPrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeManageVolumePrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeImpersonatePrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: SeCreateGlobalPrivilege 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: 33 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: 34 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: 35 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe Token: 36 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4528 wrote to memory of 3372 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe 88 PID 4528 wrote to memory of 3372 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe 88 PID 4528 wrote to memory of 3372 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe 88 PID 4528 wrote to memory of 112 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe 90 PID 4528 wrote to memory of 112 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe 90 PID 4528 wrote to memory of 112 4528 JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe 90 PID 3372 wrote to memory of 1272 3372 cmd.exe 92 PID 3372 wrote to memory of 1272 3372 cmd.exe 92 PID 3372 wrote to memory of 1272 3372 cmd.exe 92 PID 112 wrote to memory of 5972 112 cmd.exe 93 PID 112 wrote to memory of 5972 112 cmd.exe 93 PID 112 wrote to memory of 5972 112 cmd.exe 93 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 5972 attrib.exe 1272 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe"1⤵
- Modifies security service
- Windows security bypass
- Checks computer location settings
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_82270aed949bda6503b1d0874a97a63b.exe" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1272
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5972
-
-