Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 16:38
Static task
static1
Behavioral task
behavioral1
Sample
fab9010dde4439f3b8d2e91d718b8b37_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fab9010dde4439f3b8d2e91d718b8b37_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fab9010dde4439f3b8d2e91d718b8b37_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
fab9010dde4439f3b8d2e91d718b8b37
-
SHA1
25f3bfcbab66e99339c52117ccf386fc6831b8be
-
SHA256
d29bcf69e32558045ba219c136c85d1bbc552300caec42cc6c630f6ac8c86b12
-
SHA512
af5ab132fbe619338d5c4cf4c54f5304023200ffe5493e7e74137d4d64296838c3e2e2e1c10521b11aada37581e1e644d45ad0a548b49eaeb978df66e32df373
-
SSDEEP
24576:KwnU4TDLPH5BwT91EVOeW+4A6l2mJdEgMffHtNSfpzMaVI9x51oL:lntTXP56R1E05+4ZdrEgMt0MaV6GL
Malware Config
Extracted
darkcomet
Guest16
tester312.ddns.net:8888
DC_MUTEX-R0PC8F3
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
vskxKN46wJGx
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
Encryptado.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\msdcsc.exe" Encryptado.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid Process 936 attrib.exe 876 attrib.exe -
Executes dropped EXE 2 IoCs
Processes:
Encryptado.exemsdcsc.exepid Process 1944 Encryptado.exe 684 msdcsc.exe -
Loads dropped DLL 4 IoCs
Processes:
fab9010dde4439f3b8d2e91d718b8b37_JaffaCakes118.exeEncryptado.exepid Process 1640 fab9010dde4439f3b8d2e91d718b8b37_JaffaCakes118.exe 1640 fab9010dde4439f3b8d2e91d718b8b37_JaffaCakes118.exe 1944 Encryptado.exe 1944 Encryptado.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
msdcsc.exeiexplore.exeEncryptado.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\msdcsc.exe" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\msdcsc.exe" Encryptado.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
msdcsc.exedescription pid Process procid_target PID 684 set thread context of 2756 684 msdcsc.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid Process 2756 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
fab9010dde4439f3b8d2e91d718b8b37_JaffaCakes118.exeEncryptado.exemsdcsc.exeiexplore.exedescription pid Process Token: SeDebugPrivilege 1640 fab9010dde4439f3b8d2e91d718b8b37_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 1944 Encryptado.exe Token: SeSecurityPrivilege 1944 Encryptado.exe Token: SeTakeOwnershipPrivilege 1944 Encryptado.exe Token: SeLoadDriverPrivilege 1944 Encryptado.exe Token: SeSystemProfilePrivilege 1944 Encryptado.exe Token: SeSystemtimePrivilege 1944 Encryptado.exe Token: SeProfSingleProcessPrivilege 1944 Encryptado.exe Token: SeIncBasePriorityPrivilege 1944 Encryptado.exe Token: SeCreatePagefilePrivilege 1944 Encryptado.exe Token: SeBackupPrivilege 1944 Encryptado.exe Token: SeRestorePrivilege 1944 Encryptado.exe Token: SeShutdownPrivilege 1944 Encryptado.exe Token: SeDebugPrivilege 1944 Encryptado.exe Token: SeSystemEnvironmentPrivilege 1944 Encryptado.exe Token: SeChangeNotifyPrivilege 1944 Encryptado.exe Token: SeRemoteShutdownPrivilege 1944 Encryptado.exe Token: SeUndockPrivilege 1944 Encryptado.exe Token: SeManageVolumePrivilege 1944 Encryptado.exe Token: SeImpersonatePrivilege 1944 Encryptado.exe Token: SeCreateGlobalPrivilege 1944 Encryptado.exe Token: 33 1944 Encryptado.exe Token: 34 1944 Encryptado.exe Token: 35 1944 Encryptado.exe Token: SeIncreaseQuotaPrivilege 684 msdcsc.exe Token: SeSecurityPrivilege 684 msdcsc.exe Token: SeTakeOwnershipPrivilege 684 msdcsc.exe Token: SeLoadDriverPrivilege 684 msdcsc.exe Token: SeSystemProfilePrivilege 684 msdcsc.exe Token: SeSystemtimePrivilege 684 msdcsc.exe Token: SeProfSingleProcessPrivilege 684 msdcsc.exe Token: SeIncBasePriorityPrivilege 684 msdcsc.exe Token: SeCreatePagefilePrivilege 684 msdcsc.exe Token: SeBackupPrivilege 684 msdcsc.exe Token: SeRestorePrivilege 684 msdcsc.exe Token: SeShutdownPrivilege 684 msdcsc.exe Token: SeDebugPrivilege 684 msdcsc.exe Token: SeSystemEnvironmentPrivilege 684 msdcsc.exe Token: SeChangeNotifyPrivilege 684 msdcsc.exe Token: SeRemoteShutdownPrivilege 684 msdcsc.exe Token: SeUndockPrivilege 684 msdcsc.exe Token: SeManageVolumePrivilege 684 msdcsc.exe Token: SeImpersonatePrivilege 684 msdcsc.exe Token: SeCreateGlobalPrivilege 684 msdcsc.exe Token: 33 684 msdcsc.exe Token: 34 684 msdcsc.exe Token: 35 684 msdcsc.exe Token: SeIncreaseQuotaPrivilege 2756 iexplore.exe Token: SeSecurityPrivilege 2756 iexplore.exe Token: SeTakeOwnershipPrivilege 2756 iexplore.exe Token: SeLoadDriverPrivilege 2756 iexplore.exe Token: SeSystemProfilePrivilege 2756 iexplore.exe Token: SeSystemtimePrivilege 2756 iexplore.exe Token: SeProfSingleProcessPrivilege 2756 iexplore.exe Token: SeIncBasePriorityPrivilege 2756 iexplore.exe Token: SeCreatePagefilePrivilege 2756 iexplore.exe Token: SeBackupPrivilege 2756 iexplore.exe Token: SeRestorePrivilege 2756 iexplore.exe Token: SeShutdownPrivilege 2756 iexplore.exe Token: SeDebugPrivilege 2756 iexplore.exe Token: SeSystemEnvironmentPrivilege 2756 iexplore.exe Token: SeChangeNotifyPrivilege 2756 iexplore.exe Token: SeRemoteShutdownPrivilege 2756 iexplore.exe Token: SeUndockPrivilege 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
iexplore.exepid Process 2756 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fab9010dde4439f3b8d2e91d718b8b37_JaffaCakes118.exeEncryptado.execmd.execmd.exemsdcsc.exeiexplore.exedescription pid Process procid_target PID 1640 wrote to memory of 1944 1640 fab9010dde4439f3b8d2e91d718b8b37_JaffaCakes118.exe 28 PID 1640 wrote to memory of 1944 1640 fab9010dde4439f3b8d2e91d718b8b37_JaffaCakes118.exe 28 PID 1640 wrote to memory of 1944 1640 fab9010dde4439f3b8d2e91d718b8b37_JaffaCakes118.exe 28 PID 1640 wrote to memory of 1944 1640 fab9010dde4439f3b8d2e91d718b8b37_JaffaCakes118.exe 28 PID 1944 wrote to memory of 2344 1944 Encryptado.exe 29 PID 1944 wrote to memory of 2344 1944 Encryptado.exe 29 PID 1944 wrote to memory of 2344 1944 Encryptado.exe 29 PID 1944 wrote to memory of 2344 1944 Encryptado.exe 29 PID 1944 wrote to memory of 1700 1944 Encryptado.exe 30 PID 1944 wrote to memory of 1700 1944 Encryptado.exe 30 PID 1944 wrote to memory of 1700 1944 Encryptado.exe 30 PID 1944 wrote to memory of 1700 1944 Encryptado.exe 30 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1944 wrote to memory of 1644 1944 Encryptado.exe 33 PID 1700 wrote to memory of 936 1700 cmd.exe 34 PID 1700 wrote to memory of 936 1700 cmd.exe 34 PID 1700 wrote to memory of 936 1700 cmd.exe 34 PID 1700 wrote to memory of 936 1700 cmd.exe 34 PID 2344 wrote to memory of 876 2344 cmd.exe 35 PID 2344 wrote to memory of 876 2344 cmd.exe 35 PID 2344 wrote to memory of 876 2344 cmd.exe 35 PID 2344 wrote to memory of 876 2344 cmd.exe 35 PID 1944 wrote to memory of 684 1944 Encryptado.exe 36 PID 1944 wrote to memory of 684 1944 Encryptado.exe 36 PID 1944 wrote to memory of 684 1944 Encryptado.exe 36 PID 1944 wrote to memory of 684 1944 Encryptado.exe 36 PID 684 wrote to memory of 2756 684 msdcsc.exe 37 PID 684 wrote to memory of 2756 684 msdcsc.exe 37 PID 684 wrote to memory of 2756 684 msdcsc.exe 37 PID 684 wrote to memory of 2756 684 msdcsc.exe 37 PID 684 wrote to memory of 2756 684 msdcsc.exe 37 PID 684 wrote to memory of 2756 684 msdcsc.exe 37 PID 2756 wrote to memory of 2084 2756 iexplore.exe 38 PID 2756 wrote to memory of 2084 2756 iexplore.exe 38 PID 2756 wrote to memory of 2084 2756 iexplore.exe 38 PID 2756 wrote to memory of 2084 2756 iexplore.exe 38 PID 2756 wrote to memory of 2084 2756 iexplore.exe 38 PID 2756 wrote to memory of 2084 2756 iexplore.exe 38 PID 2756 wrote to memory of 2084 2756 iexplore.exe 38 PID 2756 wrote to memory of 2084 2756 iexplore.exe 38 PID 2756 wrote to memory of 2084 2756 iexplore.exe 38 PID 2756 wrote to memory of 2084 2756 iexplore.exe 38 PID 2756 wrote to memory of 2084 2756 iexplore.exe 38 PID 2756 wrote to memory of 2084 2756 iexplore.exe 38 PID 2756 wrote to memory of 2084 2756 iexplore.exe 38 PID 2756 wrote to memory of 2084 2756 iexplore.exe 38 PID 2756 wrote to memory of 2084 2756 iexplore.exe 38 PID 2756 wrote to memory of 2084 2756 iexplore.exe 38 -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid Process 876 attrib.exe 936 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fab9010dde4439f3b8d2e91d718b8b37_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fab9010dde4439f3b8d2e91d718b8b37_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Encryptado.exe"C:\Users\Admin\AppData\Local\Temp\Encryptado.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\Encryptado.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\Encryptado.exe" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:876
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:936
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵PID:1644
-
-
C:\Users\Admin\AppData\Roaming\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Roaming\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\notepad.exenotepad5⤵PID:2084
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
760KB
MD579f7a2e40afe33057b91f9587922f715
SHA11ea9f0b555a38494973fddd22c0bafc9245cb9ad
SHA256f81835bcc1344a249a9659eb153ff6b46f41122225713fbf5c9a771d6367031c
SHA512317abbc559e301a80ff13d27abb4d3534e5b7ed616ad39edf43bafe6b37d23824c4a1a4db422ed06b7078108d1adf5eabec213433cd4778580b59420d3d143fe