Analysis
-
max time kernel
147s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 06:38
General
-
Target
JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe
-
Size
272KB
-
MD5
b6e5215ec551821cab64e07f7c735a02
-
SHA1
f2f128709f4098f8074a54d7a9ffea9421b1dda1
-
SHA256
904de454c89e34764e5b9a0389627446b1fd8b00be464abcc798badd8a7b1a44
-
SHA512
5dc7133a54b2dd6f6a48ccf8e5fa8bc6f700d48825a19db25919276ca9e02a1464a050fd0888a028f303f76bf5762e81a150c954c78775743f4a052110d0fb6b
-
SSDEEP
6144:c8z/mxyyh41ilviJwI+DZuGYrFd7HIuAFFfvaw0IF0:62MIw/QGQxHIuALfvaw0IK
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-F54S21D
-
gencode
9FS7vWAib+w�
-
install
false
-
offline_keylogger
false
-
persistence
false
Signatures
-
Darkcomet family
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe -
resource yara_rule behavioral1/memory/668-0-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/668-2-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/668-4-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/668-5-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/668-6-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/668-7-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/668-8-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/668-9-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/668-10-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/668-11-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/668-12-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/668-13-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/668-14-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/668-15-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/668-16-0x0000000000400000-0x00000000004C5000-memory.dmp upx -
Program crash 11 IoCs
pid pid_target Process procid_target 4200 668 WerFault.exe 84 1908 668 WerFault.exe 84 1272 668 WerFault.exe 84 3932 668 WerFault.exe 84 2496 668 WerFault.exe 84 1528 668 WerFault.exe 84 1904 668 WerFault.exe 84 4876 668 WerFault.exe 84 5012 668 WerFault.exe 84 1176 668 WerFault.exe 84 3284 668 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeSecurityPrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeTakeOwnershipPrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeLoadDriverPrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeSystemProfilePrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeSystemtimePrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeProfSingleProcessPrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeIncBasePriorityPrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeCreatePagefilePrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeBackupPrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeRestorePrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeShutdownPrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeDebugPrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeSystemEnvironmentPrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeChangeNotifyPrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeRemoteShutdownPrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeUndockPrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeManageVolumePrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeImpersonatePrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: SeCreateGlobalPrivilege 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: 33 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: 34 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: 35 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe Token: 36 668 JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b6e5215ec551821cab64e07f7c735a02.exe"1⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 6602⤵
- Program crash
PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 7802⤵
- Program crash
PID:1908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 8522⤵
- Program crash
PID:1272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 8602⤵
- Program crash
PID:3932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 9002⤵
- Program crash
PID:2496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 10522⤵
- Program crash
PID:1528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 10522⤵
- Program crash
PID:1904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 10522⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 10762⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 11802⤵
- Program crash
PID:1176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 15322⤵
- Program crash
PID:3284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 668 -ip 6681⤵PID:1524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 668 -ip 6681⤵PID:4024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 668 -ip 6681⤵PID:1032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 668 -ip 6681⤵PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 668 -ip 6681⤵PID:1028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 668 -ip 6681⤵PID:3296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 668 -ip 6681⤵PID:4700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 668 -ip 6681⤵PID:1708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 668 -ip 6681⤵PID:4368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 668 -ip 6681⤵PID:2816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 668 -ip 6681⤵PID:1820