Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2025, 07:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bd13e46b816b8e46527a64a35b32882f.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_bd13e46b816b8e46527a64a35b32882f.exe
-
Size
2.4MB
-
MD5
bd13e46b816b8e46527a64a35b32882f
-
SHA1
3e85ff50d2059b2ff2292fe2a0d1eceab0e71fcd
-
SHA256
ddf83a8699f5db890b48d3b29b43fc6d39f32307cd091cad965e24011d49f01a
-
SHA512
2ce91782f7137655567a4c9262795d6b659ae505cb5d054d9d32df0920c0607376ba15871205a4b364d64f5443226277d654ffb93ba5353005b59e0246f2b2d0
-
SSDEEP
24576:JM3rm7OeLqMWwmQZ9sgAZioPaWW7Ak1Op+gqYV10:JMPeLqVCU7pqb
Malware Config
Extracted
darkcomet
Guest16
109.201.165.20:1604
DC_MUTEX-QX9XR2U
-
gencode
q-B9XY.uACb2
-
install
false
-
offline_keylogger
false
-
persistence
false
Signatures
-
Darkcomet family
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate YusVD.exe.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation JaffaCakes118_bd13e46b816b8e46527a64a35b32882f.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation YusVD.exe.exe -
Executes dropped EXE 2 IoCs
pid Process 5900 YusVD.exe.exe 5296 TF2 LAUNCHER.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YusVD.exe.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 YusVD.exe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString YusVD.exe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier YusVD.exe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier YusVD.exe.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier YusVD.exe.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 5900 YusVD.exe.exe Token: SeSecurityPrivilege 5900 YusVD.exe.exe Token: SeTakeOwnershipPrivilege 5900 YusVD.exe.exe Token: SeLoadDriverPrivilege 5900 YusVD.exe.exe Token: SeSystemProfilePrivilege 5900 YusVD.exe.exe Token: SeSystemtimePrivilege 5900 YusVD.exe.exe Token: SeProfSingleProcessPrivilege 5900 YusVD.exe.exe Token: SeIncBasePriorityPrivilege 5900 YusVD.exe.exe Token: SeCreatePagefilePrivilege 5900 YusVD.exe.exe Token: SeBackupPrivilege 5900 YusVD.exe.exe Token: SeRestorePrivilege 5900 YusVD.exe.exe Token: SeShutdownPrivilege 5900 YusVD.exe.exe Token: SeDebugPrivilege 5900 YusVD.exe.exe Token: SeSystemEnvironmentPrivilege 5900 YusVD.exe.exe Token: SeChangeNotifyPrivilege 5900 YusVD.exe.exe Token: SeRemoteShutdownPrivilege 5900 YusVD.exe.exe Token: SeUndockPrivilege 5900 YusVD.exe.exe Token: SeManageVolumePrivilege 5900 YusVD.exe.exe Token: SeImpersonatePrivilege 5900 YusVD.exe.exe Token: SeCreateGlobalPrivilege 5900 YusVD.exe.exe Token: 33 5900 YusVD.exe.exe Token: 34 5900 YusVD.exe.exe Token: 35 5900 YusVD.exe.exe Token: 36 5900 YusVD.exe.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 404 wrote to memory of 5900 404 JaffaCakes118_bd13e46b816b8e46527a64a35b32882f.exe 84 PID 404 wrote to memory of 5900 404 JaffaCakes118_bd13e46b816b8e46527a64a35b32882f.exe 84 PID 404 wrote to memory of 5900 404 JaffaCakes118_bd13e46b816b8e46527a64a35b32882f.exe 84 PID 5900 wrote to memory of 5296 5900 YusVD.exe.exe 88 PID 5900 wrote to memory of 5296 5900 YusVD.exe.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bd13e46b816b8e46527a64a35b32882f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bd13e46b816b8e46527a64a35b32882f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\YusVD.exe.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\YusVD.exe.exe"2⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5900 -
C:\Users\Admin\AppData\Local\Temp\TF2 LAUNCHER.EXE"C:\Users\Admin\AppData\Local\Temp\TF2 LAUNCHER.EXE"3⤵
- Executes dropped EXE
PID:5296
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188KB
MD5cc5eaf22407f08c99e179b44a70eb476
SHA1026430ab40c09fe9981a27f9761c62dbd18d5c89
SHA256733c3d64ad6f31612f74703e3955829c5d0fe8b9be1e6f1c10b5c94e474f82ea
SHA512db2e01d204d091674f3e463f13ae3f311eba60b82e9d2e8e17ed798539a66996df9ff857a6b5062b934ddbd623d76dac5075a399a6c45528449867815fe28fda
-
Filesize
901KB
MD531e20b958da9ae4b32150e20eea434ef
SHA122437440df649d201222e24a098f94bdd1971954
SHA2569ea3a8020fb5612a4fa6db45154f109786afe2fd8a929298b7cd6cdb23ec1eac
SHA51290e47c318a18175a41d72da87a0e09429cbfe98709d2efe32194943457bb49fa9807e283bdbc2646393ca3d33b1418761484640d19a0b94a80ff9104c19b07e7