Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 23:14
Behavioral task
behavioral1
Sample
f6c9055d523b94dd0dd20cb2d59ce039_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f6c9055d523b94dd0dd20cb2d59ce039_JaffaCakes118.exe
-
Size
423KB
-
MD5
f6c9055d523b94dd0dd20cb2d59ce039
-
SHA1
b25235cf8781ef947a70cebbe5ab5d3cfc18b442
-
SHA256
6b4200469bff3fb5fd0c7880de7f67d2fa83260a4159bf3d2305e73f005cdf05
-
SHA512
bcc8ae473369b75ec54d83fab15c4eb1a582ac7b64db62e45976c4b979d8c9623113bcf6bf520496f9c9f33d9b4b2a2cdd27dee7c74a844f04883176021d03bf
-
SSDEEP
12288:2lghoSqDNJ/Jj0PeLTCdKET05/hM4/KZood31gLeiW:8g2DNb0wCdKVhny/d31IeiW
Malware Config
Extracted
darkcomet
Victim
dcrat214.no-ip.biz:1604
DC_MUTEX-E5E9EN3
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
ndFoCwbBFulg
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
Stage1.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Desktop\\MSDCSC\\msdcsc.exe" Stage1.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
msdcsc.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe -
Processes:
msdcsc.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f6c9055d523b94dd0dd20cb2d59ce039_JaffaCakes118.exeStage1.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation f6c9055d523b94dd0dd20cb2d59ce039_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation Stage1.exe -
Executes dropped EXE 3 IoCs
Processes:
Stage2.exeStage1.exemsdcsc.exepid Process 2940 Stage2.exe 4656 Stage1.exe 4976 msdcsc.exe -
Processes:
resource yara_rule behavioral2/memory/1208-0-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/files/0x000300000001e9b1-5.dat upx behavioral2/memory/2940-12-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral2/memory/2940-16-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral2/files/0x0008000000023429-17.dat upx behavioral2/memory/4656-19-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/4656-32-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/1208-35-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/4976-37-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/4976-38-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/4976-39-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/4976-40-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/4976-41-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/4976-42-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/4976-43-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/4976-44-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/4976-45-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/4976-46-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/4976-47-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/4976-48-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/4976-49-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/4976-50-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/4976-51-0x0000000000400000-0x00000000004EB000-memory.dmp upx -
Processes:
msdcsc.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Stage1.exemsdcsc.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Desktop\\MSDCSC\\msdcsc.exe" Stage1.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Desktop\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
Stage1.exemsdcsc.exedescription pid Process Token: SeIncreaseQuotaPrivilege 4656 Stage1.exe Token: SeSecurityPrivilege 4656 Stage1.exe Token: SeTakeOwnershipPrivilege 4656 Stage1.exe Token: SeLoadDriverPrivilege 4656 Stage1.exe Token: SeSystemProfilePrivilege 4656 Stage1.exe Token: SeSystemtimePrivilege 4656 Stage1.exe Token: SeProfSingleProcessPrivilege 4656 Stage1.exe Token: SeIncBasePriorityPrivilege 4656 Stage1.exe Token: SeCreatePagefilePrivilege 4656 Stage1.exe Token: SeBackupPrivilege 4656 Stage1.exe Token: SeRestorePrivilege 4656 Stage1.exe Token: SeShutdownPrivilege 4656 Stage1.exe Token: SeDebugPrivilege 4656 Stage1.exe Token: SeSystemEnvironmentPrivilege 4656 Stage1.exe Token: SeChangeNotifyPrivilege 4656 Stage1.exe Token: SeRemoteShutdownPrivilege 4656 Stage1.exe Token: SeUndockPrivilege 4656 Stage1.exe Token: SeManageVolumePrivilege 4656 Stage1.exe Token: SeImpersonatePrivilege 4656 Stage1.exe Token: SeCreateGlobalPrivilege 4656 Stage1.exe Token: 33 4656 Stage1.exe Token: 34 4656 Stage1.exe Token: 35 4656 Stage1.exe Token: 36 4656 Stage1.exe Token: SeIncreaseQuotaPrivilege 4976 msdcsc.exe Token: SeSecurityPrivilege 4976 msdcsc.exe Token: SeTakeOwnershipPrivilege 4976 msdcsc.exe Token: SeLoadDriverPrivilege 4976 msdcsc.exe Token: SeSystemProfilePrivilege 4976 msdcsc.exe Token: SeSystemtimePrivilege 4976 msdcsc.exe Token: SeProfSingleProcessPrivilege 4976 msdcsc.exe Token: SeIncBasePriorityPrivilege 4976 msdcsc.exe Token: SeCreatePagefilePrivilege 4976 msdcsc.exe Token: SeBackupPrivilege 4976 msdcsc.exe Token: SeRestorePrivilege 4976 msdcsc.exe Token: SeShutdownPrivilege 4976 msdcsc.exe Token: SeDebugPrivilege 4976 msdcsc.exe Token: SeSystemEnvironmentPrivilege 4976 msdcsc.exe Token: SeChangeNotifyPrivilege 4976 msdcsc.exe Token: SeRemoteShutdownPrivilege 4976 msdcsc.exe Token: SeUndockPrivilege 4976 msdcsc.exe Token: SeManageVolumePrivilege 4976 msdcsc.exe Token: SeImpersonatePrivilege 4976 msdcsc.exe Token: SeCreateGlobalPrivilege 4976 msdcsc.exe Token: 33 4976 msdcsc.exe Token: 34 4976 msdcsc.exe Token: 35 4976 msdcsc.exe Token: 36 4976 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msdcsc.exepid Process 4976 msdcsc.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
f6c9055d523b94dd0dd20cb2d59ce039_JaffaCakes118.exeStage1.exemsdcsc.exedescription pid Process procid_target PID 1208 wrote to memory of 2940 1208 f6c9055d523b94dd0dd20cb2d59ce039_JaffaCakes118.exe 86 PID 1208 wrote to memory of 2940 1208 f6c9055d523b94dd0dd20cb2d59ce039_JaffaCakes118.exe 86 PID 1208 wrote to memory of 2940 1208 f6c9055d523b94dd0dd20cb2d59ce039_JaffaCakes118.exe 86 PID 1208 wrote to memory of 4656 1208 f6c9055d523b94dd0dd20cb2d59ce039_JaffaCakes118.exe 91 PID 1208 wrote to memory of 4656 1208 f6c9055d523b94dd0dd20cb2d59ce039_JaffaCakes118.exe 91 PID 1208 wrote to memory of 4656 1208 f6c9055d523b94dd0dd20cb2d59ce039_JaffaCakes118.exe 91 PID 4656 wrote to memory of 4976 4656 Stage1.exe 92 PID 4656 wrote to memory of 4976 4656 Stage1.exe 92 PID 4656 wrote to memory of 4976 4656 Stage1.exe 92 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93 PID 4976 wrote to memory of 3280 4976 msdcsc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6c9055d523b94dd0dd20cb2d59ce039_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6c9055d523b94dd0dd20cb2d59ce039_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\Stage2.exe"C:\Users\Admin\AppData\Local\Temp\Stage2.exe" x -y -oC:\Users\Admin\AppData\Local\Temp -pxnq8rPMxVI87ciGwWJHxRTy3iauHcIirteOOELv3B5vkS9kJoHBUAahY1dWxj8yA2⤵
- Executes dropped EXE
PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\Stage1.exe"C:\Users\Admin\AppData\Local\Temp\Stage1.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\Desktop\MSDCSC\msdcsc.exe"C:\Users\Admin\Desktop\MSDCSC\msdcsc.exe"3⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\notepad.exenotepad4⤵PID:3280
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
350KB
MD51a3a42d3d621acd0cce4e26240cc5331
SHA102f88aa3ec75ea70e3ac41268127d9e6eb07c1b9
SHA256f96860108478891f56d8e17d2931a6f4ce9c10a9eade93acc1d7383aff83247a
SHA5127a104d244128c8ce293a652a247d9351c9d38c9686b2090964898bcfa7c3fd44557f7259e789f29c332a0c099a2934c5b435f98b3432648d14adabf0b6be4e57
-
Filesize
376KB
MD5d826177f567069f085caf08bd5b3d479
SHA13b9d5af3c2e49c11bdf052ac6100e6acf7dbdfdd
SHA2568be7a28c874ae1121a057b3f12fd3632c8539083d2d95cd7871f6a70e9bd5078
SHA512752552e39abaf3c518f828d2c3499142b66bc06264e004b5b1cb2ff699a0c6f0d8b342fb141b43c1f7f7de1be4f3ae3b694307a565595d96da35949d552b0c4d