Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-06-2024 18:13
Static task
static1
Behavioral task
behavioral1
Sample
12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
12eee5b20b3d43f8d415e84ac8be5146
-
SHA1
ddca6c026d4564922731d8927f202821b6082fc8
-
SHA256
8d4c4bbf6f75b051c23697d5e312999e9c15ca3c53a8c4aa844cb77fd7bc4b71
-
SHA512
7e02419baad099d7e1fe409898dbfb8d112bf7af7713b67e5d4234f8d816f54d9dc54c5cb774bfc463a0e397ba4ebef3dcb2296deda04bca4624a22ae2af8c96
-
SSDEEP
24576:DE9Xu7phS3T3ocrb4xa9Xy7miHCsm5ng9YRkpVk7:DbmotbaiLmwy
Malware Config
Extracted
darkcomet
Guest16
88.190.236.112:1604
DC_MUTEX-2JX7Q1L
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
jwXKQ5E7XwZy
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" vbc.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 2648 attrib.exe 2596 attrib.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 2300 msdcsc.exe -
Loads dropped DLL 1 IoCs
Processes:
vbc.exepid process 2064 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exevbc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\Startup Name = "C:\\Users\\Admin\\AppData\\Roaming\\server crypter.exe" 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" vbc.exe -
Drops file in System32 directory 3 IoCs
Processes:
vbc.exedescription ioc process File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe vbc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe vbc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exedescription pid process target process PID 2280 set thread context of 2064 2280 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe -
Drops file in Windows directory 2 IoCs
Processes:
attrib.exeattrib.exedescription ioc process File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727 attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe attrib.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
vbc.exedescription pid process Token: SeIncreaseQuotaPrivilege 2064 vbc.exe Token: SeSecurityPrivilege 2064 vbc.exe Token: SeTakeOwnershipPrivilege 2064 vbc.exe Token: SeLoadDriverPrivilege 2064 vbc.exe Token: SeSystemProfilePrivilege 2064 vbc.exe Token: SeSystemtimePrivilege 2064 vbc.exe Token: SeProfSingleProcessPrivilege 2064 vbc.exe Token: SeIncBasePriorityPrivilege 2064 vbc.exe Token: SeCreatePagefilePrivilege 2064 vbc.exe Token: SeBackupPrivilege 2064 vbc.exe Token: SeRestorePrivilege 2064 vbc.exe Token: SeShutdownPrivilege 2064 vbc.exe Token: SeDebugPrivilege 2064 vbc.exe Token: SeSystemEnvironmentPrivilege 2064 vbc.exe Token: SeChangeNotifyPrivilege 2064 vbc.exe Token: SeRemoteShutdownPrivilege 2064 vbc.exe Token: SeUndockPrivilege 2064 vbc.exe Token: SeManageVolumePrivilege 2064 vbc.exe Token: SeImpersonatePrivilege 2064 vbc.exe Token: SeCreateGlobalPrivilege 2064 vbc.exe Token: 33 2064 vbc.exe Token: 34 2064 vbc.exe Token: 35 2064 vbc.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exevbc.execmd.execmd.exedescription pid process target process PID 2280 wrote to memory of 2064 2280 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 2280 wrote to memory of 2064 2280 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 2280 wrote to memory of 2064 2280 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 2280 wrote to memory of 2064 2280 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 2280 wrote to memory of 2064 2280 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 2280 wrote to memory of 2064 2280 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 2280 wrote to memory of 2064 2280 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 2280 wrote to memory of 2064 2280 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 2280 wrote to memory of 2064 2280 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 2280 wrote to memory of 2064 2280 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 2280 wrote to memory of 2064 2280 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 2280 wrote to memory of 2064 2280 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 2280 wrote to memory of 2064 2280 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 2280 wrote to memory of 2064 2280 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 2280 wrote to memory of 2064 2280 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 2064 wrote to memory of 2632 2064 vbc.exe cmd.exe PID 2064 wrote to memory of 2632 2064 vbc.exe cmd.exe PID 2064 wrote to memory of 2632 2064 vbc.exe cmd.exe PID 2064 wrote to memory of 2632 2064 vbc.exe cmd.exe PID 2064 wrote to memory of 2640 2064 vbc.exe cmd.exe PID 2064 wrote to memory of 2640 2064 vbc.exe cmd.exe PID 2064 wrote to memory of 2640 2064 vbc.exe cmd.exe PID 2064 wrote to memory of 2640 2064 vbc.exe cmd.exe PID 2640 wrote to memory of 2648 2640 cmd.exe attrib.exe PID 2640 wrote to memory of 2648 2640 cmd.exe attrib.exe PID 2640 wrote to memory of 2648 2640 cmd.exe attrib.exe PID 2640 wrote to memory of 2648 2640 cmd.exe attrib.exe PID 2632 wrote to memory of 2596 2632 cmd.exe attrib.exe PID 2632 wrote to memory of 2596 2632 cmd.exe attrib.exe PID 2632 wrote to memory of 2596 2632 cmd.exe attrib.exe PID 2632 wrote to memory of 2596 2632 cmd.exe attrib.exe PID 2064 wrote to memory of 2300 2064 vbc.exe msdcsc.exe PID 2064 wrote to memory of 2300 2064 vbc.exe msdcsc.exe PID 2064 wrote to memory of 2300 2064 vbc.exe msdcsc.exe PID 2064 wrote to memory of 2300 2064 vbc.exe msdcsc.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 2648 attrib.exe 2596 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" +s +h4⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h4⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exeFilesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
memory/2064-4-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2064-6-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2064-7-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2064-9-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2064-8-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2064-19-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2280-0-0x0000000074BC1000-0x0000000074BC2000-memory.dmpFilesize
4KB
-
memory/2280-1-0x0000000074BC0000-0x000000007516B000-memory.dmpFilesize
5.7MB
-
memory/2280-2-0x0000000074BC0000-0x000000007516B000-memory.dmpFilesize
5.7MB
-
memory/2280-5-0x0000000074BC0000-0x000000007516B000-memory.dmpFilesize
5.7MB