Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 01:42
Behavioral task
behavioral1
Sample
JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe
-
Size
686KB
-
MD5
857aeabedfb0c621ea49fe81c9458060
-
SHA1
e2b5ea100aca8e27b09205975f1a61184022348c
-
SHA256
18d52aeaa59125375425cf062ea0ad69f2e90fdd02ef30c5af79ccd566490cfb
-
SHA512
db27e70ef061a6b2790d633f66038a41fc2bc31fbd04349cd7eecd3994164c034d4bee8982f3f8157a473e0b4d779feba50f130a5c74c26d09dac4180f672b69
-
SSDEEP
12288:pXhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy452UF:VnAw2WWeFcfbP9VPSPMTSPL/rWvzq4J1
Malware Config
Extracted
darkcomet
Victime
inyourfaaace.no-ip.org:81
DC_MUTEX-AQVBRQF
-
InstallPath
MSDCSC\Setup.exe
-
gencode
vu9y6SRjoEjp
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\Setup.exe" JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" Setup.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" Setup.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile Setup.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Setup.exe -
Windows security bypass 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Setup.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2524 Setup.exe -
Loads dropped DLL 4 IoCs
pid Process 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe 2524 Setup.exe 2524 Setup.exe 2524 Setup.exe -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Setup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\Setup.exe" JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeSecurityPrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeTakeOwnershipPrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeLoadDriverPrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeSystemProfilePrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeSystemtimePrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeProfSingleProcessPrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeIncBasePriorityPrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeCreatePagefilePrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeBackupPrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeRestorePrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeShutdownPrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeDebugPrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeSystemEnvironmentPrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeChangeNotifyPrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeRemoteShutdownPrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeUndockPrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeManageVolumePrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeImpersonatePrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeCreateGlobalPrivilege 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: 33 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: 34 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: 35 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe Token: SeIncreaseQuotaPrivilege 2524 Setup.exe Token: SeSecurityPrivilege 2524 Setup.exe Token: SeTakeOwnershipPrivilege 2524 Setup.exe Token: SeLoadDriverPrivilege 2524 Setup.exe Token: SeSystemProfilePrivilege 2524 Setup.exe Token: SeSystemtimePrivilege 2524 Setup.exe Token: SeProfSingleProcessPrivilege 2524 Setup.exe Token: SeIncBasePriorityPrivilege 2524 Setup.exe Token: SeCreatePagefilePrivilege 2524 Setup.exe Token: SeBackupPrivilege 2524 Setup.exe Token: SeRestorePrivilege 2524 Setup.exe Token: SeShutdownPrivilege 2524 Setup.exe Token: SeDebugPrivilege 2524 Setup.exe Token: SeSystemEnvironmentPrivilege 2524 Setup.exe Token: SeChangeNotifyPrivilege 2524 Setup.exe Token: SeRemoteShutdownPrivilege 2524 Setup.exe Token: SeUndockPrivilege 2524 Setup.exe Token: SeManageVolumePrivilege 2524 Setup.exe Token: SeImpersonatePrivilege 2524 Setup.exe Token: SeCreateGlobalPrivilege 2524 Setup.exe Token: 33 2524 Setup.exe Token: 34 2524 Setup.exe Token: 35 2524 Setup.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2524 Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2524 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe 30 PID 1968 wrote to memory of 2524 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe 30 PID 1968 wrote to memory of 2524 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe 30 PID 1968 wrote to memory of 2524 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe 30 PID 1968 wrote to memory of 2524 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe 30 PID 1968 wrote to memory of 2524 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe 30 PID 1968 wrote to memory of 2524 1968 JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe 30 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_857aeabedfb0c621ea49fe81c9458060.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\Documents\MSDCSC\Setup.exe"C:\Users\Admin\Documents\MSDCSC\Setup.exe"2⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
686KB
MD5857aeabedfb0c621ea49fe81c9458060
SHA1e2b5ea100aca8e27b09205975f1a61184022348c
SHA25618d52aeaa59125375425cf062ea0ad69f2e90fdd02ef30c5af79ccd566490cfb
SHA512db27e70ef061a6b2790d633f66038a41fc2bc31fbd04349cd7eecd3994164c034d4bee8982f3f8157a473e0b4d779feba50f130a5c74c26d09dac4180f672b69