Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 08:16
Static task
static1
Behavioral task
behavioral1
Sample
044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe
-
Size
714KB
-
MD5
044bf3b1471af9d566e2d16e1d00439f
-
SHA1
2a74f0b0390ac3c3117cf386b33a967a7c06a553
-
SHA256
646eb9be1126e03369f16af5e3d4870cb3ff7a88f453ba738fa946edadebdd69
-
SHA512
31d48bb9a9872f68da3a4273e7e546ef698e2d26d30551cad0a6e6905f16e38b690265c3e36a5522bca2de2a2540054bb160590761c7c3bc6f0cc84bc26a3e30
-
SSDEEP
12288:i+lUsErG0Q4G8ORN7GuyMZxE02p3IqlVD1D1XKEC91zhjwbQvUPBG2/oOgw6o:urvG8ORlGavE0Fqlhixhjwkvv2lgxo
Malware Config
Extracted
darkcomet
EBP
dcservertet.no-ip.biz:1604
DC_MUTEX-AHF4VQL
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
AgWGVtEfaTpP
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
EpicBotPatcher.exe.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" EpicBotPatcher.exe.exe -
Executes dropped EXE 3 IoCs
Processes:
EpicBotPatcher.exe.exeEPICBOTPATCHER.EXEmsdcsc.exepid process 1372 EpicBotPatcher.exe.exe 2488 EPICBOTPATCHER.EXE 2892 msdcsc.exe -
Loads dropped DLL 13 IoCs
Processes:
044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exeEpicBotPatcher.exe.exeEPICBOTPATCHER.EXEmsdcsc.exepid process 2264 044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe 2264 044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe 2264 044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe 2264 044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe 1372 EpicBotPatcher.exe.exe 2488 EPICBOTPATCHER.EXE 2488 EPICBOTPATCHER.EXE 2488 EPICBOTPATCHER.EXE 1372 EpicBotPatcher.exe.exe 1372 EpicBotPatcher.exe.exe 2892 msdcsc.exe 2892 msdcsc.exe 2892 msdcsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
EpicBotPatcher.exe.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" EpicBotPatcher.exe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exeEpicBotPatcher.exe.exemsdcsc.exedescription pid process Token: 33 2264 044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2264 044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 1372 EpicBotPatcher.exe.exe Token: SeSecurityPrivilege 1372 EpicBotPatcher.exe.exe Token: SeTakeOwnershipPrivilege 1372 EpicBotPatcher.exe.exe Token: SeLoadDriverPrivilege 1372 EpicBotPatcher.exe.exe Token: SeSystemProfilePrivilege 1372 EpicBotPatcher.exe.exe Token: SeSystemtimePrivilege 1372 EpicBotPatcher.exe.exe Token: SeProfSingleProcessPrivilege 1372 EpicBotPatcher.exe.exe Token: SeIncBasePriorityPrivilege 1372 EpicBotPatcher.exe.exe Token: SeCreatePagefilePrivilege 1372 EpicBotPatcher.exe.exe Token: SeBackupPrivilege 1372 EpicBotPatcher.exe.exe Token: SeRestorePrivilege 1372 EpicBotPatcher.exe.exe Token: SeShutdownPrivilege 1372 EpicBotPatcher.exe.exe Token: SeDebugPrivilege 1372 EpicBotPatcher.exe.exe Token: SeSystemEnvironmentPrivilege 1372 EpicBotPatcher.exe.exe Token: SeChangeNotifyPrivilege 1372 EpicBotPatcher.exe.exe Token: SeRemoteShutdownPrivilege 1372 EpicBotPatcher.exe.exe Token: SeUndockPrivilege 1372 EpicBotPatcher.exe.exe Token: SeManageVolumePrivilege 1372 EpicBotPatcher.exe.exe Token: SeImpersonatePrivilege 1372 EpicBotPatcher.exe.exe Token: SeCreateGlobalPrivilege 1372 EpicBotPatcher.exe.exe Token: 33 1372 EpicBotPatcher.exe.exe Token: 34 1372 EpicBotPatcher.exe.exe Token: 35 1372 EpicBotPatcher.exe.exe Token: SeIncreaseQuotaPrivilege 2892 msdcsc.exe Token: SeSecurityPrivilege 2892 msdcsc.exe Token: SeTakeOwnershipPrivilege 2892 msdcsc.exe Token: SeLoadDriverPrivilege 2892 msdcsc.exe Token: SeSystemProfilePrivilege 2892 msdcsc.exe Token: SeSystemtimePrivilege 2892 msdcsc.exe Token: SeProfSingleProcessPrivilege 2892 msdcsc.exe Token: SeIncBasePriorityPrivilege 2892 msdcsc.exe Token: SeCreatePagefilePrivilege 2892 msdcsc.exe Token: SeBackupPrivilege 2892 msdcsc.exe Token: SeRestorePrivilege 2892 msdcsc.exe Token: SeShutdownPrivilege 2892 msdcsc.exe Token: SeDebugPrivilege 2892 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2892 msdcsc.exe Token: SeChangeNotifyPrivilege 2892 msdcsc.exe Token: SeRemoteShutdownPrivilege 2892 msdcsc.exe Token: SeUndockPrivilege 2892 msdcsc.exe Token: SeManageVolumePrivilege 2892 msdcsc.exe Token: SeImpersonatePrivilege 2892 msdcsc.exe Token: SeCreateGlobalPrivilege 2892 msdcsc.exe Token: 33 2892 msdcsc.exe Token: 34 2892 msdcsc.exe Token: 35 2892 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msdcsc.exepid process 2892 msdcsc.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exeEpicBotPatcher.exe.exedescription pid process target process PID 2264 wrote to memory of 1372 2264 044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe EpicBotPatcher.exe.exe PID 2264 wrote to memory of 1372 2264 044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe EpicBotPatcher.exe.exe PID 2264 wrote to memory of 1372 2264 044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe EpicBotPatcher.exe.exe PID 2264 wrote to memory of 1372 2264 044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe EpicBotPatcher.exe.exe PID 2264 wrote to memory of 1372 2264 044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe EpicBotPatcher.exe.exe PID 2264 wrote to memory of 1372 2264 044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe EpicBotPatcher.exe.exe PID 2264 wrote to memory of 1372 2264 044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe EpicBotPatcher.exe.exe PID 1372 wrote to memory of 2488 1372 EpicBotPatcher.exe.exe EPICBOTPATCHER.EXE PID 1372 wrote to memory of 2488 1372 EpicBotPatcher.exe.exe EPICBOTPATCHER.EXE PID 1372 wrote to memory of 2488 1372 EpicBotPatcher.exe.exe EPICBOTPATCHER.EXE PID 1372 wrote to memory of 2488 1372 EpicBotPatcher.exe.exe EPICBOTPATCHER.EXE PID 1372 wrote to memory of 2488 1372 EpicBotPatcher.exe.exe EPICBOTPATCHER.EXE PID 1372 wrote to memory of 2488 1372 EpicBotPatcher.exe.exe EPICBOTPATCHER.EXE PID 1372 wrote to memory of 2488 1372 EpicBotPatcher.exe.exe EPICBOTPATCHER.EXE PID 1372 wrote to memory of 2892 1372 EpicBotPatcher.exe.exe msdcsc.exe PID 1372 wrote to memory of 2892 1372 EpicBotPatcher.exe.exe msdcsc.exe PID 1372 wrote to memory of 2892 1372 EpicBotPatcher.exe.exe msdcsc.exe PID 1372 wrote to memory of 2892 1372 EpicBotPatcher.exe.exe msdcsc.exe PID 1372 wrote to memory of 2892 1372 EpicBotPatcher.exe.exe msdcsc.exe PID 1372 wrote to memory of 2892 1372 EpicBotPatcher.exe.exe msdcsc.exe PID 1372 wrote to memory of 2892 1372 EpicBotPatcher.exe.exe msdcsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\044bf3b1471af9d566e2d16e1d00439f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
\DEVICE\HARDDISKVOLUME2\Users\Admin\AppData\Local\Xenocode\Sandbox\EpicBotPatcher\1.1.0.1\2012.03.27T15.08\Virtual\STUBEXE\8.0.1135\@DOCUMENTS@\EpicBotPatcher.exe.exe"C:\Users\Admin\Documents\EpicBotPatcher.exe.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
\DEVICE\HARDDISKVOLUME2\Users\Admin\AppData\Local\Xenocode\Sandbox\EpicBotPatcher\1.1.0.1\2012.03.27T15.08\Native\STUBEXE\8.0.1135\@APPDATALOCAL@\Temp\EPICBOTPATCHER.EXE"C:\Users\Admin\AppData\Local\Temp\EPICBOTPATCHER.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
\DEVICE\HARDDISKVOLUME2\Users\Admin\AppData\Local\Xenocode\Sandbox\EpicBotPatcher\1.1.0.1\2012.03.27T15.08\Native\STUBEXE\8.0.1135\@DOCUMENTS@\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\EPICBOTPATCHER.EXEFilesize
50KB
MD5d32b48eaeaef877b69751c9045ead30c
SHA1e7374a048b87e4feeda2d109be82686a42917ab8
SHA256c35f17e36a09b55445e04285b053aea29b4a52efec7d6a9014f9cdf2164e6f23
SHA512cc31b9bcf13d9a37e407ed65042876a6742ab9f4bc43fb99666cf6320c2a051825ed97207979c10f8f2820c15c0cc23e84b39dc58d676fb06b25324a92ae2aa7
-
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\EpicBotPatcher\1.1.0.1\2012.03.27T15.08\Native\STUBEXE\8.0.1135\@APPDATALOCAL@\Temp\EPICBOTPATCHER.EXEFilesize
17KB
MD5c26241506736859b04732bdc6c379f22
SHA1d9bb520ad8a96d2b1686e27e84c6e8a5613ecab7
SHA256de001a73956e284932132531e164e6486a2e029ecc5fd0c59cc69dd06574ebfe
SHA51298e44d11b481375c6936cee467295975ba6c6bc409d9eff5b3b1d881d52a5778e319d100c381b389aa1de8a9a651fb9daf420f93a251f83c3a43da4fd408c2fd
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\EpicBotPatcher\1.1.0.1\2012.03.27T15.08\Native\STUBEXE\8.0.1135\@DOCUMENTS@\MSDCSC\msdcsc.exeFilesize
17KB
MD5f7d526c3ff55b4b5ab8338ce3421c35e
SHA1dfae8d46cf52382c4ec71f2c5ff4d82be1cdb1df
SHA256583a345058cad9b24938402ecb7cbbcea3ef2c5ac766d08b97f3802026cdb057
SHA512938f95b9ba53137506a62847311b665afff874fb47dff7c726aff4bec18f6e7fbfdc0b81ed78e70ac78bb4a657a892b3c04e4b41ec0da6ad5d03c6efa69d1d18
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\EpicBotPatcher\1.1.0.1\2012.03.27T15.08\Virtual\MODIFIED\@DOCUMENTS@\EpicBotPatcher.exe.exeFilesize
717KB
MD58e45f24897782dfd4e205b82d328e6b5
SHA1699fc852a712238be2ff1a1adfb5e719c3de4645
SHA256b4bde29a37502ddccab1a0a330ada64a3c241f115db1daba3fb8958d2b61d73c
SHA512aa97a4c93f9dfa87f140188016c21dbf909b859a6a2a26bfc666af2a4466bacb55b5668385aab687df8f09791c8576621a650a6301a2ca0e78c9f6b767ea8cca
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\EpicBotPatcher\1.1.0.1\2012.03.27T15.08\Virtual\STUBEXE\8.0.1135\@DOCUMENTS@\EpicBotPatcher.exe.exeFilesize
17KB
MD55c1bd8d183bc09e617fac8a0ef0c4c28
SHA19dc878eb7cc4c3e3e3ee663471c2a5040f13a1f6
SHA256971aa6db0ef9a0e7e86a39ba61e825a6b4ada79eafa321dd6673ed0c9e348c80
SHA512f43741cbd92ed12f7e3c134564c535c582b343cf0f2b86b412faa9632a64114c0658740e3605270e5137a5706dd5bb5f748813e5eb29bb4db485a2b98dd4bf6e
-
memory/1372-43-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-38-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-89-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-87-0x0000000000830000-0x00000000008A2000-memory.dmpFilesize
456KB
-
memory/1372-21-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-11-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-13-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-23-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-35-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-34-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-33-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-32-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-31-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-30-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-36-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-29-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-42-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-46-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-47-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-12-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-15-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-52-0x0000000000830000-0x00000000008A2000-memory.dmpFilesize
456KB
-
memory/1372-45-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-44-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-16-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-17-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-86-0x0000000000830000-0x00000000008A2000-memory.dmpFilesize
456KB
-
memory/1372-19-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-18-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-72-0x0000000000830000-0x00000000008A2000-memory.dmpFilesize
456KB
-
memory/1372-20-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-41-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-40-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-39-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-22-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-37-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-28-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-27-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-26-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-25-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/1372-24-0x0000000000400000-0x00000000004C1000-memory.dmpFilesize
772KB
-
memory/2264-1-0x0000000077E00000-0x0000000077E01000-memory.dmpFilesize
4KB
-
memory/2264-4-0x0000000010000000-0x0000000010037000-memory.dmpFilesize
220KB
-
memory/2264-3-0x0000000010000000-0x0000000010037000-memory.dmpFilesize
220KB
-
memory/2264-5-0x0000000010000000-0x0000000010037000-memory.dmpFilesize
220KB
-
memory/2264-6-0x0000000010000000-0x0000000010037000-memory.dmpFilesize
220KB
-
memory/2264-94-0x0000000000380000-0x00000000003F2000-memory.dmpFilesize
456KB
-
memory/2264-0-0x0000000000380000-0x00000000003F2000-memory.dmpFilesize
456KB
-
memory/2264-2-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/2264-51-0x0000000000380000-0x00000000003F2000-memory.dmpFilesize
456KB
-
memory/2264-8-0x0000000000380000-0x00000000003F2000-memory.dmpFilesize
456KB
-
memory/2264-7-0x0000000010000000-0x0000000010037000-memory.dmpFilesize
220KB
-
memory/2488-70-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2488-71-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2488-73-0x0000000000330000-0x00000000003A2000-memory.dmpFilesize
456KB
-
memory/2488-69-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB