Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2025, 09:58
Behavioral task
behavioral1
Sample
JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe
-
Size
283KB
-
MD5
825b181b68fb2049bc80548574e2e83c
-
SHA1
a54df320ca805e17c0669baa43d9d6b9993f6d20
-
SHA256
9f834da1d7cfc652d75721348fc4755e0529514a7ba1c8770e6817579d72586c
-
SHA512
4646f3382308a6da5d1ce90ce40e98b672a86bf82efffd554db01fc8be435f721249f6f009ee0e34b19057dbfdb7f0d8ca0e155e6d8618787a8cc4a052a36fc2
-
SSDEEP
6144:5cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37C:5cW7KEZlPzCy37C
Malware Config
Extracted
darkcomet
ser
10.0.2.15:1789
DC_MUTEX-DD61YBU
-
gencode
GSS0tzrp3y6E
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
Windows security bypass 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2180 attrib.exe 960 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
resource yara_rule behavioral2/memory/1952-0-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral2/memory/1952-3-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral2/memory/1952-4-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral2/memory/1952-6-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral2/memory/1952-8-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral2/memory/1952-11-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral2/memory/1952-13-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral2/memory/1952-17-0x0000000000400000-0x00000000004C7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeSecurityPrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeTakeOwnershipPrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeLoadDriverPrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeSystemProfilePrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeSystemtimePrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeProfSingleProcessPrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeIncBasePriorityPrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeCreatePagefilePrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeBackupPrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeRestorePrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeShutdownPrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeDebugPrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeSystemEnvironmentPrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeChangeNotifyPrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeRemoteShutdownPrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeUndockPrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeManageVolumePrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeImpersonatePrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: SeCreateGlobalPrivilege 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: 33 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: 34 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: 35 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Token: 36 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1952 wrote to memory of 3092 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 87 PID 1952 wrote to memory of 3092 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 87 PID 1952 wrote to memory of 3092 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 87 PID 1952 wrote to memory of 5236 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 88 PID 1952 wrote to memory of 5236 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 88 PID 1952 wrote to memory of 5236 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 88 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 1952 wrote to memory of 4440 1952 JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe 90 PID 3092 wrote to memory of 2180 3092 cmd.exe 92 PID 3092 wrote to memory of 2180 3092 cmd.exe 92 PID 3092 wrote to memory of 2180 3092 cmd.exe 92 PID 5236 wrote to memory of 960 5236 cmd.exe 93 PID 5236 wrote to memory of 960 5236 cmd.exe 93 PID 5236 wrote to memory of 960 5236 cmd.exe 93 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2180 attrib.exe 960 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe"1⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Checks computer location settings
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_825b181b68fb2049bc80548574e2e83c.exe" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2180
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5236 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:960
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- System Location Discovery: System Language Discovery
PID:4440
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5