Analysis
-
max time kernel
133s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/04/2025, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe
-
Size
764KB
-
MD5
bbf7c96e37e67baf7969a1ef0002a403
-
SHA1
5e1e6e63e3da11b4c4f0c8429e424d99fe354f8a
-
SHA256
1f80d1af672a300c2704a261ba05c5cfb2dbbbb934749fdd26a7099a58259f77
-
SHA512
268d13a2032df9290c7e18f9345ed7f885a8c80037a52b521e976ab76485c6cdc94e74c95495c317c69cffa2d761f532357822ff8089686912fec6ba8bf424e1
-
SSDEEP
12288:XZeVQkTrvj4r6/nZXDm3ynq9OotqFP4G8erVnj1O61WltQOjuLkEsjfhNcMvC:XwQkTf4r69TiOoCeej1l1WltjrrIqC
Malware Config
Extracted
darkcomet
My server
192.168.12.4:36049
DC_MUTEX-8DYRWVQ
-
InstallPath
ransdWindupdt\windowz.exe
-
gencode
B3a1qL*Pj1PT
-
install
true
-
offline_keylogger
true
-
password
sopwenv1
-
persistence
false
-
reg_key
winupdater
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\ransdWindupdt\\windowz.exe" JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\ransdWindupdt\\windowz.exe,C:\\Windows\\system32\\ransdWindupdt\\windowz.exe" windowz.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate windowz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 1604 windowz.exe 4648 windowz.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3664858464-2411077738-2029630556-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\ransdWindupdt\\windowz.exe" JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Set value (str) \REGISTRY\USER\S-1-5-21-3664858464-2411077738-2029630556-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\ransdWindupdt\\windowz.exe" windowz.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ransdWindupdt\windowz.exe JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe File opened for modification C:\Windows\SysWOW64\ransdWindupdt\ JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe File created C:\Windows\SysWOW64\ransdWindupdt\windowz.exe windowz.exe File opened for modification C:\Windows\SysWOW64\ransdWindupdt\windowz.exe windowz.exe File opened for modification C:\Windows\SysWOW64\ransdWindupdt\ windowz.exe File created C:\Windows\SysWOW64\ransdWindupdt\windowz.exe JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 6000 set thread context of 4864 6000 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 78 PID 1604 set thread context of 4648 1604 windowz.exe 83 PID 4648 set thread context of 4212 4648 windowz.exe 86 PID 4212 set thread context of 2460 4212 explorer.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 windowz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier windowz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString windowz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier windowz.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier windowz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 6000 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeIncreaseQuotaPrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeSecurityPrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeTakeOwnershipPrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeLoadDriverPrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeSystemProfilePrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeSystemtimePrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeProfSingleProcessPrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeIncBasePriorityPrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeCreatePagefilePrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeBackupPrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeRestorePrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeShutdownPrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeDebugPrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeSystemEnvironmentPrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeChangeNotifyPrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeRemoteShutdownPrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeUndockPrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeManageVolumePrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeImpersonatePrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeCreateGlobalPrivilege 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: 33 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: 34 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: 35 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: 36 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe Token: SeDebugPrivilege 1604 windowz.exe Token: SeIncreaseQuotaPrivilege 4648 windowz.exe Token: SeSecurityPrivilege 4648 windowz.exe Token: SeTakeOwnershipPrivilege 4648 windowz.exe Token: SeLoadDriverPrivilege 4648 windowz.exe Token: SeSystemProfilePrivilege 4648 windowz.exe Token: SeSystemtimePrivilege 4648 windowz.exe Token: SeProfSingleProcessPrivilege 4648 windowz.exe Token: SeIncBasePriorityPrivilege 4648 windowz.exe Token: SeCreatePagefilePrivilege 4648 windowz.exe Token: SeBackupPrivilege 4648 windowz.exe Token: SeRestorePrivilege 4648 windowz.exe Token: SeShutdownPrivilege 4648 windowz.exe Token: SeDebugPrivilege 4648 windowz.exe Token: SeSystemEnvironmentPrivilege 4648 windowz.exe Token: SeChangeNotifyPrivilege 4648 windowz.exe Token: SeRemoteShutdownPrivilege 4648 windowz.exe Token: SeUndockPrivilege 4648 windowz.exe Token: SeManageVolumePrivilege 4648 windowz.exe Token: SeImpersonatePrivilege 4648 windowz.exe Token: SeCreateGlobalPrivilege 4648 windowz.exe Token: 33 4648 windowz.exe Token: 34 4648 windowz.exe Token: 35 4648 windowz.exe Token: 36 4648 windowz.exe Token: SeDebugPrivilege 4212 explorer.exe Token: SeIncreaseQuotaPrivilege 2460 explorer.exe Token: SeSecurityPrivilege 2460 explorer.exe Token: SeTakeOwnershipPrivilege 2460 explorer.exe Token: SeLoadDriverPrivilege 2460 explorer.exe Token: SeSystemProfilePrivilege 2460 explorer.exe Token: SeSystemtimePrivilege 2460 explorer.exe Token: SeProfSingleProcessPrivilege 2460 explorer.exe Token: SeIncBasePriorityPrivilege 2460 explorer.exe Token: SeCreatePagefilePrivilege 2460 explorer.exe Token: SeBackupPrivilege 2460 explorer.exe Token: SeRestorePrivilege 2460 explorer.exe Token: SeShutdownPrivilege 2460 explorer.exe Token: SeDebugPrivilege 2460 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2460 explorer.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 6000 wrote to memory of 4864 6000 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 78 PID 6000 wrote to memory of 4864 6000 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 78 PID 6000 wrote to memory of 4864 6000 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 78 PID 6000 wrote to memory of 4864 6000 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 78 PID 6000 wrote to memory of 4864 6000 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 78 PID 6000 wrote to memory of 4864 6000 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 78 PID 6000 wrote to memory of 4864 6000 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 78 PID 6000 wrote to memory of 4864 6000 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 78 PID 6000 wrote to memory of 4864 6000 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 78 PID 6000 wrote to memory of 4864 6000 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 78 PID 6000 wrote to memory of 4864 6000 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 78 PID 6000 wrote to memory of 4864 6000 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 78 PID 6000 wrote to memory of 4864 6000 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 78 PID 6000 wrote to memory of 4864 6000 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 78 PID 4864 wrote to memory of 1160 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 81 PID 4864 wrote to memory of 1160 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 81 PID 4864 wrote to memory of 1160 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 81 PID 4864 wrote to memory of 1604 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 82 PID 4864 wrote to memory of 1604 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 82 PID 4864 wrote to memory of 1604 4864 JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe 82 PID 1604 wrote to memory of 4648 1604 windowz.exe 83 PID 1604 wrote to memory of 4648 1604 windowz.exe 83 PID 1604 wrote to memory of 4648 1604 windowz.exe 83 PID 1604 wrote to memory of 4648 1604 windowz.exe 83 PID 1604 wrote to memory of 4648 1604 windowz.exe 83 PID 1604 wrote to memory of 4648 1604 windowz.exe 83 PID 1604 wrote to memory of 4648 1604 windowz.exe 83 PID 1604 wrote to memory of 4648 1604 windowz.exe 83 PID 1604 wrote to memory of 4648 1604 windowz.exe 83 PID 1604 wrote to memory of 4648 1604 windowz.exe 83 PID 1604 wrote to memory of 4648 1604 windowz.exe 83 PID 1604 wrote to memory of 4648 1604 windowz.exe 83 PID 1604 wrote to memory of 4648 1604 windowz.exe 83 PID 1604 wrote to memory of 4648 1604 windowz.exe 83 PID 4648 wrote to memory of 4212 4648 windowz.exe 86 PID 4648 wrote to memory of 4212 4648 windowz.exe 86 PID 4648 wrote to memory of 4212 4648 windowz.exe 86 PID 4648 wrote to memory of 4212 4648 windowz.exe 86 PID 4648 wrote to memory of 4212 4648 windowz.exe 86 PID 4212 wrote to memory of 2460 4212 explorer.exe 87 PID 4212 wrote to memory of 2460 4212 explorer.exe 87 PID 4212 wrote to memory of 2460 4212 explorer.exe 87 PID 4212 wrote to memory of 2460 4212 explorer.exe 87 PID 4212 wrote to memory of 2460 4212 explorer.exe 87 PID 4212 wrote to memory of 2460 4212 explorer.exe 87 PID 4212 wrote to memory of 2460 4212 explorer.exe 87 PID 4212 wrote to memory of 2460 4212 explorer.exe 87 PID 4212 wrote to memory of 2460 4212 explorer.exe 87 PID 4212 wrote to memory of 2460 4212 explorer.exe 87 PID 4212 wrote to memory of 2460 4212 explorer.exe 87 PID 4212 wrote to memory of 2460 4212 explorer.exe 87 PID 4212 wrote to memory of 2460 4212 explorer.exe 87 PID 4212 wrote to memory of 2460 4212 explorer.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6000 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bbf7c96e37e67baf7969a1ef0002a403.exe"2⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵PID:1160
-
-
C:\Windows\SysWOW64\ransdWindupdt\windowz.exe"C:\Windows\system32\ransdWindupdt\windowz.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\ransdWindupdt\windowz.exe"C:\Windows\SysWOW64\ransdWindupdt\windowz.exe"4⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"6⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2460
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\ransdWindupdt\windowz.exe1⤵PID:2560
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\ransdWindupdt\windowz.exe1⤵PID:1192
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5fc7cb853ff46332d91e6a9d9695cc63e
SHA196752577b64c35e2b1ba0efa9b5e1da94aa73e76
SHA256766c1a420bb0808d091d9586f88be36a4e4cc8321b7b3f37882d3f4f15a3cba3
SHA512195702085117681f83833ebeb0d9fc7e81b1ac552e6d667209fe1063dbf0f269800311d8f333f0cc8a6949e27299f7339060def5ce0479aa9941e9613c5c1193
-
Filesize
764KB
MD5bbf7c96e37e67baf7969a1ef0002a403
SHA15e1e6e63e3da11b4c4f0c8429e424d99fe354f8a
SHA2561f80d1af672a300c2704a261ba05c5cfb2dbbbb934749fdd26a7099a58259f77
SHA512268d13a2032df9290c7e18f9345ed7f885a8c80037a52b521e976ab76485c6cdc94e74c95495c317c69cffa2d761f532357822ff8089686912fec6ba8bf424e1