Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 04:38
Static task
static1
Behavioral task
behavioral1
Sample
4971cbda2ce4bdf86dec04ac74312294_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
4971cbda2ce4bdf86dec04ac74312294_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
4971cbda2ce4bdf86dec04ac74312294
-
SHA1
6210ca0a46cf544c43ab17b04097900b75c59a60
-
SHA256
cdcff159a39016096b8e853db27c3769c74a2701cc8f5449c560f635c0f1eb49
-
SHA512
88e8ddbafa13b2034472ded0120601d87b5edc8de68de8e3bf8978bb8f7eb63bf36ae86440c5e2477fe2172ea15a98e1b27b9141f1aea060c7a5f17883234f99
-
SSDEEP
24576:lMDMXJRHMTFbwtDTA4HwjonDRMy3IMj1dwlfj:lBRsT5GDTNHwAM4IMfwNj
Malware Config
Extracted
darkcomet
Nostale
nostalehackerteam23.ddns.net:1605
DC_MUTEX-6B09PS6
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
tRYKJDK6obFj
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
Encryptado.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\msdcsc.exe" Encryptado.exe -
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
msdcsc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
msdcsc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
msdcsc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msdcsc.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 4748 attrib.exe 4656 attrib.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4971cbda2ce4bdf86dec04ac74312294_JaffaCakes118.exeEncryptado.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 4971cbda2ce4bdf86dec04ac74312294_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Encryptado.exe -
Executes dropped EXE 2 IoCs
Processes:
Encryptado.exemsdcsc.exepid process 4884 Encryptado.exe 768 msdcsc.exe -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Encryptado.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\msdcsc.exe" Encryptado.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
Encryptado.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Encryptado.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msdcsc.exepid process 768 msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
Encryptado.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 4884 Encryptado.exe Token: SeSecurityPrivilege 4884 Encryptado.exe Token: SeTakeOwnershipPrivilege 4884 Encryptado.exe Token: SeLoadDriverPrivilege 4884 Encryptado.exe Token: SeSystemProfilePrivilege 4884 Encryptado.exe Token: SeSystemtimePrivilege 4884 Encryptado.exe Token: SeProfSingleProcessPrivilege 4884 Encryptado.exe Token: SeIncBasePriorityPrivilege 4884 Encryptado.exe Token: SeCreatePagefilePrivilege 4884 Encryptado.exe Token: SeBackupPrivilege 4884 Encryptado.exe Token: SeRestorePrivilege 4884 Encryptado.exe Token: SeShutdownPrivilege 4884 Encryptado.exe Token: SeDebugPrivilege 4884 Encryptado.exe Token: SeSystemEnvironmentPrivilege 4884 Encryptado.exe Token: SeChangeNotifyPrivilege 4884 Encryptado.exe Token: SeRemoteShutdownPrivilege 4884 Encryptado.exe Token: SeUndockPrivilege 4884 Encryptado.exe Token: SeManageVolumePrivilege 4884 Encryptado.exe Token: SeImpersonatePrivilege 4884 Encryptado.exe Token: SeCreateGlobalPrivilege 4884 Encryptado.exe Token: 33 4884 Encryptado.exe Token: 34 4884 Encryptado.exe Token: 35 4884 Encryptado.exe Token: 36 4884 Encryptado.exe Token: SeIncreaseQuotaPrivilege 768 msdcsc.exe Token: SeSecurityPrivilege 768 msdcsc.exe Token: SeTakeOwnershipPrivilege 768 msdcsc.exe Token: SeLoadDriverPrivilege 768 msdcsc.exe Token: SeSystemProfilePrivilege 768 msdcsc.exe Token: SeSystemtimePrivilege 768 msdcsc.exe Token: SeProfSingleProcessPrivilege 768 msdcsc.exe Token: SeIncBasePriorityPrivilege 768 msdcsc.exe Token: SeCreatePagefilePrivilege 768 msdcsc.exe Token: SeBackupPrivilege 768 msdcsc.exe Token: SeRestorePrivilege 768 msdcsc.exe Token: SeShutdownPrivilege 768 msdcsc.exe Token: SeDebugPrivilege 768 msdcsc.exe Token: SeSystemEnvironmentPrivilege 768 msdcsc.exe Token: SeChangeNotifyPrivilege 768 msdcsc.exe Token: SeRemoteShutdownPrivilege 768 msdcsc.exe Token: SeUndockPrivilege 768 msdcsc.exe Token: SeManageVolumePrivilege 768 msdcsc.exe Token: SeImpersonatePrivilege 768 msdcsc.exe Token: SeCreateGlobalPrivilege 768 msdcsc.exe Token: 33 768 msdcsc.exe Token: 34 768 msdcsc.exe Token: 35 768 msdcsc.exe Token: 36 768 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msdcsc.exepid process 768 msdcsc.exe -
Suspicious use of WriteProcessMemory 57 IoCs
Processes:
4971cbda2ce4bdf86dec04ac74312294_JaffaCakes118.exeEncryptado.execmd.execmd.exemsdcsc.exedescription pid process target process PID 5088 wrote to memory of 4884 5088 4971cbda2ce4bdf86dec04ac74312294_JaffaCakes118.exe Encryptado.exe PID 5088 wrote to memory of 4884 5088 4971cbda2ce4bdf86dec04ac74312294_JaffaCakes118.exe Encryptado.exe PID 5088 wrote to memory of 4884 5088 4971cbda2ce4bdf86dec04ac74312294_JaffaCakes118.exe Encryptado.exe PID 4884 wrote to memory of 4428 4884 Encryptado.exe cmd.exe PID 4884 wrote to memory of 4428 4884 Encryptado.exe cmd.exe PID 4884 wrote to memory of 4428 4884 Encryptado.exe cmd.exe PID 4884 wrote to memory of 1684 4884 Encryptado.exe cmd.exe PID 4884 wrote to memory of 1684 4884 Encryptado.exe cmd.exe PID 4884 wrote to memory of 1684 4884 Encryptado.exe cmd.exe PID 4884 wrote to memory of 4896 4884 Encryptado.exe notepad.exe PID 4884 wrote to memory of 4896 4884 Encryptado.exe notepad.exe PID 4884 wrote to memory of 4896 4884 Encryptado.exe notepad.exe PID 4884 wrote to memory of 4896 4884 Encryptado.exe notepad.exe PID 4884 wrote to memory of 4896 4884 Encryptado.exe notepad.exe PID 4884 wrote to memory of 4896 4884 Encryptado.exe notepad.exe PID 4884 wrote to memory of 4896 4884 Encryptado.exe notepad.exe PID 4884 wrote to memory of 4896 4884 Encryptado.exe notepad.exe PID 4884 wrote to memory of 4896 4884 Encryptado.exe notepad.exe PID 4884 wrote to memory of 4896 4884 Encryptado.exe notepad.exe PID 4884 wrote to memory of 4896 4884 Encryptado.exe notepad.exe PID 4884 wrote to memory of 4896 4884 Encryptado.exe notepad.exe PID 4884 wrote to memory of 4896 4884 Encryptado.exe notepad.exe PID 4884 wrote to memory of 4896 4884 Encryptado.exe notepad.exe PID 4884 wrote to memory of 4896 4884 Encryptado.exe notepad.exe PID 4884 wrote to memory of 4896 4884 Encryptado.exe notepad.exe PID 4884 wrote to memory of 4896 4884 Encryptado.exe notepad.exe PID 4428 wrote to memory of 4748 4428 cmd.exe attrib.exe PID 4428 wrote to memory of 4748 4428 cmd.exe attrib.exe PID 4428 wrote to memory of 4748 4428 cmd.exe attrib.exe PID 1684 wrote to memory of 4656 1684 cmd.exe attrib.exe PID 1684 wrote to memory of 4656 1684 cmd.exe attrib.exe PID 1684 wrote to memory of 4656 1684 cmd.exe attrib.exe PID 4884 wrote to memory of 768 4884 Encryptado.exe msdcsc.exe PID 4884 wrote to memory of 768 4884 Encryptado.exe msdcsc.exe PID 4884 wrote to memory of 768 4884 Encryptado.exe msdcsc.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe PID 768 wrote to memory of 2244 768 msdcsc.exe notepad.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 4748 attrib.exe 4656 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4971cbda2ce4bdf86dec04ac74312294_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4971cbda2ce4bdf86dec04ac74312294_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Encryptado.exe"C:\Users\Admin\AppData\Local\Temp\Encryptado.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\Encryptado.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\Encryptado.exe" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
-
C:\Users\Admin\AppData\Roaming\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Roaming\MSDCSC\msdcsc.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad4⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Encryptado.exeFilesize
756KB
MD54480f6a6936492314fb069023d45274a
SHA183de4c2c45ac4f190c47c88f237761bf7bcfd248
SHA256c7045a77c41067048f52cbe1bcce1e8dc09bb0264e4f2acbc882798272fe962d
SHA5127b5f18719cf50cb3e41032d11efb34241f901aa1f3ddcb2ed28a29f31bd55a105747f4314a3caa1b6d0046cc6075299e35a9189781c6ba8169cdacdb67e50be2
-
memory/768-97-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB
-
memory/768-95-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB
-
memory/768-100-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB
-
memory/768-99-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB
-
memory/768-98-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB
-
memory/768-89-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB
-
memory/768-96-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB
-
memory/768-101-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB
-
memory/768-94-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB
-
memory/768-102-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB
-
memory/768-93-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB
-
memory/768-92-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB
-
memory/768-91-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB
-
memory/768-90-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB
-
memory/2244-86-0x0000000001290000-0x0000000001291000-memory.dmpFilesize
4KB
-
memory/4884-21-0x00000000022C0000-0x00000000022C1000-memory.dmpFilesize
4KB
-
memory/4884-87-0x0000000000400000-0x00000000004CA000-memory.dmpFilesize
808KB
-
memory/4896-27-0x0000000000710000-0x0000000000711000-memory.dmpFilesize
4KB
-
memory/5088-8-0x0000000074B60000-0x0000000075310000-memory.dmpFilesize
7.7MB
-
memory/5088-26-0x0000000074B60000-0x0000000075310000-memory.dmpFilesize
7.7MB
-
memory/5088-9-0x0000000074B60000-0x0000000075310000-memory.dmpFilesize
7.7MB
-
memory/5088-0-0x0000000074B6E000-0x0000000074B6F000-memory.dmpFilesize
4KB
-
memory/5088-7-0x0000000074B60000-0x0000000075310000-memory.dmpFilesize
7.7MB
-
memory/5088-6-0x00000000051A0000-0x00000000051F6000-memory.dmpFilesize
344KB
-
memory/5088-5-0x0000000004F10000-0x0000000004F1A000-memory.dmpFilesize
40KB
-
memory/5088-4-0x0000000004F50000-0x0000000004FE2000-memory.dmpFilesize
584KB
-
memory/5088-3-0x0000000005460000-0x0000000005A04000-memory.dmpFilesize
5.6MB
-
memory/5088-2-0x0000000004E10000-0x0000000004EAC000-memory.dmpFilesize
624KB
-
memory/5088-1-0x0000000000460000-0x00000000004BE000-memory.dmpFilesize
376KB