Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 18:13
Static task
static1
Behavioral task
behavioral1
Sample
12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
12eee5b20b3d43f8d415e84ac8be5146
-
SHA1
ddca6c026d4564922731d8927f202821b6082fc8
-
SHA256
8d4c4bbf6f75b051c23697d5e312999e9c15ca3c53a8c4aa844cb77fd7bc4b71
-
SHA512
7e02419baad099d7e1fe409898dbfb8d112bf7af7713b67e5d4234f8d816f54d9dc54c5cb774bfc463a0e397ba4ebef3dcb2296deda04bca4624a22ae2af8c96
-
SSDEEP
24576:DE9Xu7phS3T3ocrb4xa9Xy7miHCsm5ng9YRkpVk7:DbmotbaiLmwy
Malware Config
Extracted
darkcomet
Guest16
88.190.236.112:1604
DC_MUTEX-2JX7Q1L
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
jwXKQ5E7XwZy
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" vbc.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 3692 attrib.exe 4088 attrib.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 4652 msdcsc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exevbc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Startup Name = "C:\\Users\\Admin\\AppData\\Roaming\\server crypter.exe" 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" vbc.exe -
Drops file in System32 directory 3 IoCs
Processes:
vbc.exedescription ioc process File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe vbc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe vbc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exedescription pid process target process PID 440 set thread context of 352 440 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe -
Drops file in Windows directory 2 IoCs
Processes:
attrib.exeattrib.exedescription ioc process File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727 attrib.exe -
Modifies registry class 1 IoCs
Processes:
vbc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ vbc.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
vbc.exedescription pid process Token: SeIncreaseQuotaPrivilege 352 vbc.exe Token: SeSecurityPrivilege 352 vbc.exe Token: SeTakeOwnershipPrivilege 352 vbc.exe Token: SeLoadDriverPrivilege 352 vbc.exe Token: SeSystemProfilePrivilege 352 vbc.exe Token: SeSystemtimePrivilege 352 vbc.exe Token: SeProfSingleProcessPrivilege 352 vbc.exe Token: SeIncBasePriorityPrivilege 352 vbc.exe Token: SeCreatePagefilePrivilege 352 vbc.exe Token: SeBackupPrivilege 352 vbc.exe Token: SeRestorePrivilege 352 vbc.exe Token: SeShutdownPrivilege 352 vbc.exe Token: SeDebugPrivilege 352 vbc.exe Token: SeSystemEnvironmentPrivilege 352 vbc.exe Token: SeChangeNotifyPrivilege 352 vbc.exe Token: SeRemoteShutdownPrivilege 352 vbc.exe Token: SeUndockPrivilege 352 vbc.exe Token: SeManageVolumePrivilege 352 vbc.exe Token: SeImpersonatePrivilege 352 vbc.exe Token: SeCreateGlobalPrivilege 352 vbc.exe Token: 33 352 vbc.exe Token: 34 352 vbc.exe Token: 35 352 vbc.exe Token: 36 352 vbc.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exevbc.execmd.execmd.exedescription pid process target process PID 440 wrote to memory of 352 440 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 440 wrote to memory of 352 440 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 440 wrote to memory of 352 440 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 440 wrote to memory of 352 440 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 440 wrote to memory of 352 440 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 440 wrote to memory of 352 440 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 440 wrote to memory of 352 440 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 440 wrote to memory of 352 440 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 440 wrote to memory of 352 440 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 440 wrote to memory of 352 440 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 440 wrote to memory of 352 440 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 440 wrote to memory of 352 440 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 440 wrote to memory of 352 440 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 440 wrote to memory of 352 440 12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe vbc.exe PID 352 wrote to memory of 4772 352 vbc.exe cmd.exe PID 352 wrote to memory of 4772 352 vbc.exe cmd.exe PID 352 wrote to memory of 4772 352 vbc.exe cmd.exe PID 352 wrote to memory of 4368 352 vbc.exe cmd.exe PID 352 wrote to memory of 4368 352 vbc.exe cmd.exe PID 352 wrote to memory of 4368 352 vbc.exe cmd.exe PID 4772 wrote to memory of 3692 4772 cmd.exe attrib.exe PID 4772 wrote to memory of 3692 4772 cmd.exe attrib.exe PID 4772 wrote to memory of 3692 4772 cmd.exe attrib.exe PID 4368 wrote to memory of 4088 4368 cmd.exe attrib.exe PID 4368 wrote to memory of 4088 4368 cmd.exe attrib.exe PID 4368 wrote to memory of 4088 4368 cmd.exe attrib.exe PID 352 wrote to memory of 4652 352 vbc.exe msdcsc.exe PID 352 wrote to memory of 4652 352 vbc.exe msdcsc.exe PID 352 wrote to memory of 4652 352 vbc.exe msdcsc.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 3692 attrib.exe 4088 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\12eee5b20b3d43f8d415e84ac8be5146_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" +s +h4⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h4⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exeFilesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
memory/352-5-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/352-4-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/352-7-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/352-9-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/352-10-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/352-70-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/440-0-0x00000000755A2000-0x00000000755A3000-memory.dmpFilesize
4KB
-
memory/440-1-0x00000000755A0000-0x0000000075B51000-memory.dmpFilesize
5.7MB
-
memory/440-2-0x00000000755A0000-0x0000000075B51000-memory.dmpFilesize
5.7MB
-
memory/440-8-0x00000000755A0000-0x0000000075B51000-memory.dmpFilesize
5.7MB