Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_929f77a47a4a33455ccdb7366ef0ff98.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_929f77a47a4a33455ccdb7366ef0ff98.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_929f77a47a4a33455ccdb7366ef0ff98.exe
-
Size
899KB
-
MD5
929f77a47a4a33455ccdb7366ef0ff98
-
SHA1
38b8140d139c212b12ac4fbef64a339da3a50af9
-
SHA256
cca77ef16e89bff979f6abf9b435cf7c433f664f6003648a4645530c37a857a4
-
SHA512
8cab77bc38be2aca1ded368a3ffac1f56d21351ea24c0271daf0b11d833d0e120c9a2be9061248aa951cb268efdf7b42aa157bc54415e7f6154475ad22835488
-
SSDEEP
12288:EdQyETqOIG8u8IaPowniyjkRmFm9fMVa5t3OYyd0kf5jkJxL1XWkGl4IsGikcDho:EdQuOIG8gsTo3N3OYif5jOWkwtsBxmH
Malware Config
Extracted
darkcomet
O0ziil
dylz-h4ck.no-ip.org:1324
DC_MUTEX-09AT1EJ
-
InstallPath
system32/winlogon.exe
-
gencode
wM-hxmeQDf2%
-
install
true
-
offline_keylogger
true
-
password
dinounou
-
persistence
true
-
reg_key
winlogon
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\system32/winlogon.exe" Crypted.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" Crypted.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile Crypted.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "1" Crypted.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" Crypted.exe -
Windows security bypass 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Crypted.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Crypted.exe -
Disables Task Manager via registry modification
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Crypted.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Control Panel\International\Geo\Nation JaffaCakes118_929f77a47a4a33455ccdb7366ef0ff98.exe -
Executes dropped EXE 1 IoCs
pid Process 4464 Crypted.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Crypted.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Crypted.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\system32/winlogon.exe" Crypted.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crypted.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Crypted.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Crypted.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Crypted.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Crypted.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Crypted.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4464 Crypted.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4464 Crypted.exe Token: SeSecurityPrivilege 4464 Crypted.exe Token: SeTakeOwnershipPrivilege 4464 Crypted.exe Token: SeLoadDriverPrivilege 4464 Crypted.exe Token: SeSystemProfilePrivilege 4464 Crypted.exe Token: SeSystemtimePrivilege 4464 Crypted.exe Token: SeProfSingleProcessPrivilege 4464 Crypted.exe Token: SeIncBasePriorityPrivilege 4464 Crypted.exe Token: SeCreatePagefilePrivilege 4464 Crypted.exe Token: SeBackupPrivilege 4464 Crypted.exe Token: SeRestorePrivilege 4464 Crypted.exe Token: SeShutdownPrivilege 4464 Crypted.exe Token: SeDebugPrivilege 4464 Crypted.exe Token: SeSystemEnvironmentPrivilege 4464 Crypted.exe Token: SeChangeNotifyPrivilege 4464 Crypted.exe Token: SeRemoteShutdownPrivilege 4464 Crypted.exe Token: SeUndockPrivilege 4464 Crypted.exe Token: SeManageVolumePrivilege 4464 Crypted.exe Token: SeImpersonatePrivilege 4464 Crypted.exe Token: SeCreateGlobalPrivilege 4464 Crypted.exe Token: 33 4464 Crypted.exe Token: 34 4464 Crypted.exe Token: 35 4464 Crypted.exe Token: 36 4464 Crypted.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4464 Crypted.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5656 wrote to memory of 4464 5656 JaffaCakes118_929f77a47a4a33455ccdb7366ef0ff98.exe 86 PID 5656 wrote to memory of 4464 5656 JaffaCakes118_929f77a47a4a33455ccdb7366ef0ff98.exe 86 PID 5656 wrote to memory of 4464 5656 JaffaCakes118_929f77a47a4a33455ccdb7366ef0ff98.exe 86 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" Crypted.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion Crypted.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern Crypted.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_929f77a47a4a33455ccdb7366ef0ff98.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_929f77a47a4a33455ccdb7366ef0ff98.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5656 -
C:\Users\Admin\AppData\Local\Temp\Crypted.exe"C:\Users\Admin\AppData\Local\Temp\Crypted.exe"2⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Checks BIOS information in registry
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\system32/winlogon.exe1⤵PID:4244
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
715KB
MD5520a0d514865c7b47f0ff777e8b0eb6d
SHA195f13f1f821cea475bd4b1f84dcac0451f19a6e0
SHA2562acbda4ff8fbb755d6c68abbb028ef3e205d942a056986343c3958f62a4787f1
SHA512f42bb992a1a3710230523edcbfc52ccc0f3ca96a0529dc476a525974a2e3608d0f0ecbd7075cdbe99e7c30e2f89c46138bbddd22561d06c92e935cfd0ae9e5d9