Analysis
-
max time kernel
97s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/04/2025, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe
Resource
win11-20250410-en
General
-
Target
JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe
-
Size
480KB
-
MD5
bc56976bbcc722af33dee6c3d395be9b
-
SHA1
2a2e6cb1f22b2fff1b4e1ceb3698ee8800ec59ed
-
SHA256
b1e54f7e0b8233ec5ff57b3c2aca46b242205915cac4b6e06c51d14911e978f8
-
SHA512
fd317b6211721210f4553319b57856cba0297179a2f0d41116a3144299d7ff9d9a99c1739e3a3388784f2ad11e37d5fe8afb4439c90ed4b8a333d4e413c54e70
-
SSDEEP
12288:ty1lFipP5dFl9DhwZ0PRfwzp35HGPHb6kyQwTRHbVDU:ty1lc3TlnwkOaHhE
Malware Config
Extracted
darkcomet
ms-dos
pourmoi.zapto.org:2000
pourmoi.zapto.org:200
pourmoi.zapto.org:1604
pourmoi.zapto.org:164
pourmoi.zapto.org:80
DC_MUTEX-HM3EBEZ
-
gencode
.o3or#SP7wV0
-
install
false
-
offline_keylogger
true
-
password
da06101266
-
persistence
false
Signatures
-
Darkcomet family
-
Sets file to hidden 1 TTPs 4 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3468 attrib.exe 2076 attrib.exe 4964 attrib.exe 5088 attrib.exe -
Executes dropped EXE 1 IoCs
pid Process 2312 winfile.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1492919288-2219487354-2015056034-1000\Software\Microsoft\Windows\CurrentVersion\Run\winsys = "C:\\Users\\Admin\\AppData\\Local\\Temp\\winfile.exe" JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe File opened for modification C:\Windows\assembly\Desktop.ini JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2556 set thread context of 4908 2556 JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe 78 PID 2312 set thread context of 4200 2312 winfile.exe 83 -
resource yara_rule behavioral2/memory/4908-5-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-8-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-9-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-12-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-11-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-13-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-35-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-34-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-32-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-33-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4200-45-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4200-43-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-48-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-49-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-50-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-51-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-52-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-53-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-54-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-55-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-56-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-57-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-58-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-59-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-60-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-61-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-62-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-63-0x0000000000400000-0x00000000004D8000-memory.dmp upx behavioral2/memory/4908-64-0x0000000000400000-0x00000000004D8000-memory.dmp upx -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727 attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727 attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727 attrib.exe File opened for modification C:\Windows\assembly JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe File created C:\Windows\assembly\Desktop.ini JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe File opened for modification C:\Windows\assembly\Desktop.ini JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe attrib.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winfile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4908 vbc.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeDebugPrivilege 2556 JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe Token: 33 2556 JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe Token: SeIncBasePriorityPrivilege 2556 JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe Token: SeIncreaseQuotaPrivilege 4908 vbc.exe Token: SeSecurityPrivilege 4908 vbc.exe Token: SeTakeOwnershipPrivilege 4908 vbc.exe Token: SeLoadDriverPrivilege 4908 vbc.exe Token: SeSystemProfilePrivilege 4908 vbc.exe Token: SeSystemtimePrivilege 4908 vbc.exe Token: SeProfSingleProcessPrivilege 4908 vbc.exe Token: SeIncBasePriorityPrivilege 4908 vbc.exe Token: SeCreatePagefilePrivilege 4908 vbc.exe Token: SeBackupPrivilege 4908 vbc.exe Token: SeRestorePrivilege 4908 vbc.exe Token: SeShutdownPrivilege 4908 vbc.exe Token: SeDebugPrivilege 4908 vbc.exe Token: SeSystemEnvironmentPrivilege 4908 vbc.exe Token: SeChangeNotifyPrivilege 4908 vbc.exe Token: SeRemoteShutdownPrivilege 4908 vbc.exe Token: SeUndockPrivilege 4908 vbc.exe Token: SeManageVolumePrivilege 4908 vbc.exe Token: SeImpersonatePrivilege 4908 vbc.exe Token: SeCreateGlobalPrivilege 4908 vbc.exe Token: 33 4908 vbc.exe Token: 34 4908 vbc.exe Token: 35 4908 vbc.exe Token: 36 4908 vbc.exe Token: SeDebugPrivilege 2312 winfile.exe Token: 33 2312 winfile.exe Token: SeIncBasePriorityPrivilege 2312 winfile.exe Token: SeIncreaseQuotaPrivilege 4200 vbc.exe Token: SeSecurityPrivilege 4200 vbc.exe Token: SeTakeOwnershipPrivilege 4200 vbc.exe Token: SeLoadDriverPrivilege 4200 vbc.exe Token: SeSystemProfilePrivilege 4200 vbc.exe Token: SeSystemtimePrivilege 4200 vbc.exe Token: SeProfSingleProcessPrivilege 4200 vbc.exe Token: SeIncBasePriorityPrivilege 4200 vbc.exe Token: SeCreatePagefilePrivilege 4200 vbc.exe Token: SeBackupPrivilege 4200 vbc.exe Token: SeRestorePrivilege 4200 vbc.exe Token: SeShutdownPrivilege 4200 vbc.exe Token: SeDebugPrivilege 4200 vbc.exe Token: SeSystemEnvironmentPrivilege 4200 vbc.exe Token: SeChangeNotifyPrivilege 4200 vbc.exe Token: SeRemoteShutdownPrivilege 4200 vbc.exe Token: SeUndockPrivilege 4200 vbc.exe Token: SeManageVolumePrivilege 4200 vbc.exe Token: SeImpersonatePrivilege 4200 vbc.exe Token: SeCreateGlobalPrivilege 4200 vbc.exe Token: 33 4200 vbc.exe Token: 34 4200 vbc.exe Token: 35 4200 vbc.exe Token: 36 4200 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4908 vbc.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2556 wrote to memory of 4908 2556 JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe 78 PID 2556 wrote to memory of 4908 2556 JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe 78 PID 2556 wrote to memory of 4908 2556 JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe 78 PID 2556 wrote to memory of 4908 2556 JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe 78 PID 2556 wrote to memory of 4908 2556 JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe 78 PID 2556 wrote to memory of 4908 2556 JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe 78 PID 2556 wrote to memory of 4908 2556 JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe 78 PID 2556 wrote to memory of 4908 2556 JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe 78 PID 3220 wrote to memory of 2312 3220 cmd.exe 81 PID 3220 wrote to memory of 2312 3220 cmd.exe 81 PID 3220 wrote to memory of 2312 3220 cmd.exe 81 PID 4908 wrote to memory of 5344 4908 vbc.exe 82 PID 4908 wrote to memory of 5344 4908 vbc.exe 82 PID 4908 wrote to memory of 5344 4908 vbc.exe 82 PID 2312 wrote to memory of 4200 2312 winfile.exe 83 PID 2312 wrote to memory of 4200 2312 winfile.exe 83 PID 2312 wrote to memory of 4200 2312 winfile.exe 83 PID 2312 wrote to memory of 4200 2312 winfile.exe 83 PID 2312 wrote to memory of 4200 2312 winfile.exe 83 PID 2312 wrote to memory of 4200 2312 winfile.exe 83 PID 2312 wrote to memory of 4200 2312 winfile.exe 83 PID 2312 wrote to memory of 4200 2312 winfile.exe 83 PID 4908 wrote to memory of 868 4908 vbc.exe 85 PID 4908 wrote to memory of 868 4908 vbc.exe 85 PID 4908 wrote to memory of 868 4908 vbc.exe 85 PID 5344 wrote to memory of 5088 5344 cmd.exe 87 PID 5344 wrote to memory of 5088 5344 cmd.exe 87 PID 5344 wrote to memory of 5088 5344 cmd.exe 87 PID 4200 wrote to memory of 4412 4200 vbc.exe 88 PID 4200 wrote to memory of 4412 4200 vbc.exe 88 PID 4200 wrote to memory of 4412 4200 vbc.exe 88 PID 4200 wrote to memory of 4388 4200 vbc.exe 90 PID 4200 wrote to memory of 4388 4200 vbc.exe 90 PID 4200 wrote to memory of 4388 4200 vbc.exe 90 PID 868 wrote to memory of 3468 868 cmd.exe 92 PID 868 wrote to memory of 3468 868 cmd.exe 92 PID 868 wrote to memory of 3468 868 cmd.exe 92 PID 4412 wrote to memory of 2076 4412 cmd.exe 93 PID 4412 wrote to memory of 2076 4412 cmd.exe 93 PID 4412 wrote to memory of 2076 4412 cmd.exe 93 PID 4388 wrote to memory of 4964 4388 cmd.exe 94 PID 4388 wrote to memory of 4964 4388 cmd.exe 94 PID 4388 wrote to memory of 4964 4388 cmd.exe 94 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 5088 attrib.exe 3468 attrib.exe 2076 attrib.exe 4964 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bc56976bbcc722af33dee6c3d395be9b.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5344 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" +s +h4⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h4⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3468
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\winfile.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\winfile.exeC:\Users\Admin\AppData\Local\Temp\winfile.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h5⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h5⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4964
-
-
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70B
MD573b0495dfd90f2f77a64d3ac7f6e7c03
SHA10503c56481fda524b90139b4d2e0b686765c355f
SHA2560a4c374db7dcbe8944a2a3fc0d774247861318cc55494fe8b6f001fe46a69fc2
SHA5129d6fbe22f8441cf2b78506bde2535e4137af1c200fe36272d4fb0adea8f33360c93cb1619c3b667514f185d632a078760ebc0f47eeb0825979e468a7c2c88e39
-
Filesize
62B
MD5c6abd7a109bb37ab773b9e79b91b7741
SHA17933b8795914b27483d2afed35b3830e8bf5bdb6
SHA2568bc84b3ddfd9c295f555926bf1c311be423732423c585ca90796cdee7a245629
SHA51235d14c9b7366a4737e3685223d55d85c583c7fbe73274577424dc8d9960cc78c79a80a8b42a62f6d9d9962ddd60cf2a332411d4ac18196258dc9d5b0b575e3dc
-
Filesize
480KB
MD5bc56976bbcc722af33dee6c3d395be9b
SHA12a2e6cb1f22b2fff1b4e1ceb3698ee8800ec59ed
SHA256b1e54f7e0b8233ec5ff57b3c2aca46b242205915cac4b6e06c51d14911e978f8
SHA512fd317b6211721210f4553319b57856cba0297179a2f0d41116a3144299d7ff9d9a99c1739e3a3388784f2ad11e37d5fe8afb4439c90ed4b8a333d4e413c54e70