Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 14:53
Behavioral task
behavioral1
Sample
4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe
-
Size
349KB
-
MD5
4ba3b7693391fa5d8326b686692a9f91
-
SHA1
bfe26b996c5a1176896cbd82ef8044af25042720
-
SHA256
475604a43c345971022ae3da673840556e6a65e9355ca2376cc3b81b65bbce3f
-
SHA512
de6c30aa11c1cc63947566b5bcbed45dbefce9d9edabadb069b14157bf64d9aad87bcc92e9453f89e7b5b3858a87d41deb7dc3f288db9430aad0e64dfeddeb1d
-
SSDEEP
6144:McNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37WAuPlbL:McW7KEZlPzCy37
Malware Config
Extracted
darkcomet
maincraft
petyx.ddns.net:7895
duxa.ddns.net:7895
DC_MUTEX-P0HW8GA
-
InstallPath
MSDCSC\Windows.exe
-
gencode
RbtaWfmoGPRb
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\Windows.exe" 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe -
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
iexplore.exeWindows.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" iexplore.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile Windows.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" Windows.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" Windows.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" iexplore.exe -
Modifies security service 2 TTPs 2 IoCs
Processes:
Windows.exeiexplore.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Windows.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" iexplore.exe -
Disables RegEdit via registry modification 2 IoCs
Processes:
iexplore.exeWindows.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Windows.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 2544 attrib.exe 2672 attrib.exe -
Executes dropped EXE 1 IoCs
Processes:
Windows.exepid process 2804 Windows.exe -
Loads dropped DLL 2 IoCs
Processes:
4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exepid process 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/2892-0-0x0000000000400000-0x00000000004E8000-memory.dmp upx \Users\Admin\AppData\Roaming\MSDCSC\Windows.exe upx behavioral1/memory/2804-13-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral1/memory/2804-17-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral1/memory/2312-15-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral1/memory/2892-18-0x0000000000400000-0x00000000004E8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
iexplore.exe4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exeWindows.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\Windows.exe" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\Windows.exe" 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\MSDCSC\\Windows.exe" Windows.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Windows.exedescription pid process target process PID 2804 set thread context of 2312 2804 Windows.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exeWindows.exeiexplore.exedescription pid process Token: SeIncreaseQuotaPrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeSecurityPrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeSystemtimePrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeBackupPrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeRestorePrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeShutdownPrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeDebugPrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeUndockPrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeManageVolumePrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeImpersonatePrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: 33 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: 34 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: 35 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2804 Windows.exe Token: SeSecurityPrivilege 2804 Windows.exe Token: SeTakeOwnershipPrivilege 2804 Windows.exe Token: SeLoadDriverPrivilege 2804 Windows.exe Token: SeSystemProfilePrivilege 2804 Windows.exe Token: SeSystemtimePrivilege 2804 Windows.exe Token: SeProfSingleProcessPrivilege 2804 Windows.exe Token: SeIncBasePriorityPrivilege 2804 Windows.exe Token: SeCreatePagefilePrivilege 2804 Windows.exe Token: SeBackupPrivilege 2804 Windows.exe Token: SeRestorePrivilege 2804 Windows.exe Token: SeShutdownPrivilege 2804 Windows.exe Token: SeDebugPrivilege 2804 Windows.exe Token: SeSystemEnvironmentPrivilege 2804 Windows.exe Token: SeChangeNotifyPrivilege 2804 Windows.exe Token: SeRemoteShutdownPrivilege 2804 Windows.exe Token: SeUndockPrivilege 2804 Windows.exe Token: SeManageVolumePrivilege 2804 Windows.exe Token: SeImpersonatePrivilege 2804 Windows.exe Token: SeCreateGlobalPrivilege 2804 Windows.exe Token: 33 2804 Windows.exe Token: 34 2804 Windows.exe Token: 35 2804 Windows.exe Token: SeIncreaseQuotaPrivilege 2312 iexplore.exe Token: SeSecurityPrivilege 2312 iexplore.exe Token: SeTakeOwnershipPrivilege 2312 iexplore.exe Token: SeLoadDriverPrivilege 2312 iexplore.exe Token: SeSystemProfilePrivilege 2312 iexplore.exe Token: SeSystemtimePrivilege 2312 iexplore.exe Token: SeProfSingleProcessPrivilege 2312 iexplore.exe Token: SeIncBasePriorityPrivilege 2312 iexplore.exe Token: SeCreatePagefilePrivilege 2312 iexplore.exe Token: SeBackupPrivilege 2312 iexplore.exe Token: SeRestorePrivilege 2312 iexplore.exe Token: SeShutdownPrivilege 2312 iexplore.exe Token: SeDebugPrivilege 2312 iexplore.exe Token: SeSystemEnvironmentPrivilege 2312 iexplore.exe Token: SeChangeNotifyPrivilege 2312 iexplore.exe Token: SeRemoteShutdownPrivilege 2312 iexplore.exe Token: SeUndockPrivilege 2312 iexplore.exe Token: SeManageVolumePrivilege 2312 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
iexplore.exepid process 2312 iexplore.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.execmd.execmd.exeWindows.exedescription pid process target process PID 2892 wrote to memory of 3016 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe cmd.exe PID 2892 wrote to memory of 3016 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe cmd.exe PID 2892 wrote to memory of 3016 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe cmd.exe PID 2892 wrote to memory of 3016 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe cmd.exe PID 2892 wrote to memory of 2532 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe cmd.exe PID 2892 wrote to memory of 2532 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe cmd.exe PID 2892 wrote to memory of 2532 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe cmd.exe PID 2892 wrote to memory of 2532 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe cmd.exe PID 3016 wrote to memory of 2544 3016 cmd.exe attrib.exe PID 3016 wrote to memory of 2544 3016 cmd.exe attrib.exe PID 3016 wrote to memory of 2544 3016 cmd.exe attrib.exe PID 3016 wrote to memory of 2544 3016 cmd.exe attrib.exe PID 2532 wrote to memory of 2672 2532 cmd.exe attrib.exe PID 2532 wrote to memory of 2672 2532 cmd.exe attrib.exe PID 2532 wrote to memory of 2672 2532 cmd.exe attrib.exe PID 2532 wrote to memory of 2672 2532 cmd.exe attrib.exe PID 2892 wrote to memory of 2804 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Windows.exe PID 2892 wrote to memory of 2804 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Windows.exe PID 2892 wrote to memory of 2804 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Windows.exe PID 2892 wrote to memory of 2804 2892 4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe Windows.exe PID 2804 wrote to memory of 2312 2804 Windows.exe iexplore.exe PID 2804 wrote to memory of 2312 2804 Windows.exe iexplore.exe PID 2804 wrote to memory of 2312 2804 Windows.exe iexplore.exe PID 2804 wrote to memory of 2312 2804 Windows.exe iexplore.exe PID 2804 wrote to memory of 2312 2804 Windows.exe iexplore.exe PID 2804 wrote to memory of 2312 2804 Windows.exe iexplore.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
Windows.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" Windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion Windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern Windows.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 2544 attrib.exe 2672 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\4ba3b7693391fa5d8326b686692a9f91_JaffaCakes118.exe" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Roaming\MSDCSC\Windows.exe"C:\Users\Admin\AppData\Roaming\MSDCSC\Windows.exe"2⤵
- Modifies firewall policy service
- Modifies security service
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Disables RegEdit via registry modification
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\MSDCSC\Windows.exeFilesize
349KB
MD54ba3b7693391fa5d8326b686692a9f91
SHA1bfe26b996c5a1176896cbd82ef8044af25042720
SHA256475604a43c345971022ae3da673840556e6a65e9355ca2376cc3b81b65bbce3f
SHA512de6c30aa11c1cc63947566b5bcbed45dbefce9d9edabadb069b14157bf64d9aad87bcc92e9453f89e7b5b3858a87d41deb7dc3f288db9430aad0e64dfeddeb1d
-
memory/2312-15-0x0000000000400000-0x00000000004E8000-memory.dmpFilesize
928KB
-
memory/2804-13-0x0000000000400000-0x00000000004E8000-memory.dmpFilesize
928KB
-
memory/2804-17-0x0000000000400000-0x00000000004E8000-memory.dmpFilesize
928KB
-
memory/2892-0-0x0000000000400000-0x00000000004E8000-memory.dmpFilesize
928KB
-
memory/2892-1-0x00000000003E0000-0x00000000003E1000-memory.dmpFilesize
4KB
-
memory/2892-12-0x00000000043D0000-0x00000000044B8000-memory.dmpFilesize
928KB
-
memory/2892-18-0x0000000000400000-0x00000000004E8000-memory.dmpFilesize
928KB