Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
26-06-2024 20:59
Static task
static1
Behavioral task
behavioral1
Sample
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe
-
Size
398KB
-
MD5
136e24d2e40c6bb49efec2c643f2dbe4
-
SHA1
0eb613aee9bd84a91045b01df6e80639b3072497
-
SHA256
d14dc0c863a908b364ddb07dce87c1936d7d6f50f341f1ba72c83342bcdc5a66
-
SHA512
9bcda7a8a883d2aad638ba6e27e315dea9ad3d69659473a8610169179c06635b04d71c3c950257c951e222280ecdd3e66548906f2aa22bf9f30d31187bf95c20
-
SSDEEP
12288:r0eFWYP1stdJTFoKTV45jEJnp2/FB02fHdf:r0evStdEKTV45ss/L9f
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-TDUES14
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
kLFnMeH6GMti
-
install
true
-
offline_keylogger
true
-
password
0123456789
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\MSDCSC\\msdcsc.exe" 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Executes dropped EXE 2 IoCs
Processes:
msdcsc.exemsdcsc.exepid process 2996 msdcsc.exe 3004 msdcsc.exe -
Loads dropped DLL 2 IoCs
Processes:
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exepid process 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\MSDCSC\\msdcsc.exe" 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exemsdcsc.exedescription pid process target process PID 1732 set thread context of 2200 1732 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 2996 set thread context of 3004 2996 msdcsc.exe msdcsc.exe -
Drops file in Windows directory 3 IoCs
Processes:
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exedescription ioc process File created C:\Windows\MSDCSC\msdcsc.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe File opened for modification C:\Windows\MSDCSC\msdcsc.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe File opened for modification C:\Windows\MSDCSC\ 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msdcsc.exepid process 3004 msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeSecurityPrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeSystemtimePrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeBackupPrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeRestorePrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeShutdownPrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeDebugPrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeUndockPrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeManageVolumePrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeImpersonatePrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: 33 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: 34 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: 35 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 3004 msdcsc.exe Token: SeSecurityPrivilege 3004 msdcsc.exe Token: SeTakeOwnershipPrivilege 3004 msdcsc.exe Token: SeLoadDriverPrivilege 3004 msdcsc.exe Token: SeSystemProfilePrivilege 3004 msdcsc.exe Token: SeSystemtimePrivilege 3004 msdcsc.exe Token: SeProfSingleProcessPrivilege 3004 msdcsc.exe Token: SeIncBasePriorityPrivilege 3004 msdcsc.exe Token: SeCreatePagefilePrivilege 3004 msdcsc.exe Token: SeBackupPrivilege 3004 msdcsc.exe Token: SeRestorePrivilege 3004 msdcsc.exe Token: SeShutdownPrivilege 3004 msdcsc.exe Token: SeDebugPrivilege 3004 msdcsc.exe Token: SeSystemEnvironmentPrivilege 3004 msdcsc.exe Token: SeChangeNotifyPrivilege 3004 msdcsc.exe Token: SeRemoteShutdownPrivilege 3004 msdcsc.exe Token: SeUndockPrivilege 3004 msdcsc.exe Token: SeManageVolumePrivilege 3004 msdcsc.exe Token: SeImpersonatePrivilege 3004 msdcsc.exe Token: SeCreateGlobalPrivilege 3004 msdcsc.exe Token: 33 3004 msdcsc.exe Token: 34 3004 msdcsc.exe Token: 35 3004 msdcsc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exemsdcsc.exemsdcsc.exepid process 1732 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 2996 msdcsc.exe 3004 msdcsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.execmd.exemsdcsc.exemsdcsc.exedescription pid process target process PID 1732 wrote to memory of 2200 1732 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 1732 wrote to memory of 2200 1732 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 1732 wrote to memory of 2200 1732 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 1732 wrote to memory of 2200 1732 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 1732 wrote to memory of 2200 1732 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 1732 wrote to memory of 2200 1732 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 1732 wrote to memory of 2200 1732 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 1732 wrote to memory of 2200 1732 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 1732 wrote to memory of 2200 1732 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 1732 wrote to memory of 2200 1732 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 1732 wrote to memory of 2200 1732 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 1732 wrote to memory of 2200 1732 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 1732 wrote to memory of 2200 1732 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 1732 wrote to memory of 2200 1732 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 1732 wrote to memory of 2200 1732 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 2200 wrote to memory of 2024 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe cmd.exe PID 2200 wrote to memory of 2024 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe cmd.exe PID 2200 wrote to memory of 2024 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe cmd.exe PID 2200 wrote to memory of 2024 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe cmd.exe PID 2200 wrote to memory of 2996 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe msdcsc.exe PID 2200 wrote to memory of 2996 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe msdcsc.exe PID 2200 wrote to memory of 2996 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe msdcsc.exe PID 2200 wrote to memory of 2996 2200 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe msdcsc.exe PID 2024 wrote to memory of 2676 2024 cmd.exe attrib.exe PID 2024 wrote to memory of 2676 2024 cmd.exe attrib.exe PID 2024 wrote to memory of 2676 2024 cmd.exe attrib.exe PID 2024 wrote to memory of 2676 2024 cmd.exe attrib.exe PID 2996 wrote to memory of 3004 2996 msdcsc.exe msdcsc.exe PID 2996 wrote to memory of 3004 2996 msdcsc.exe msdcsc.exe PID 2996 wrote to memory of 3004 2996 msdcsc.exe msdcsc.exe PID 2996 wrote to memory of 3004 2996 msdcsc.exe msdcsc.exe PID 2996 wrote to memory of 3004 2996 msdcsc.exe msdcsc.exe PID 2996 wrote to memory of 3004 2996 msdcsc.exe msdcsc.exe PID 2996 wrote to memory of 3004 2996 msdcsc.exe msdcsc.exe PID 2996 wrote to memory of 3004 2996 msdcsc.exe msdcsc.exe PID 2996 wrote to memory of 3004 2996 msdcsc.exe msdcsc.exe PID 2996 wrote to memory of 3004 2996 msdcsc.exe msdcsc.exe PID 2996 wrote to memory of 3004 2996 msdcsc.exe msdcsc.exe PID 2996 wrote to memory of 3004 2996 msdcsc.exe msdcsc.exe PID 2996 wrote to memory of 3004 2996 msdcsc.exe msdcsc.exe PID 2996 wrote to memory of 3004 2996 msdcsc.exe msdcsc.exe PID 2996 wrote to memory of 3004 2996 msdcsc.exe msdcsc.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe PID 3004 wrote to memory of 2796 3004 msdcsc.exe notepad.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\MSDCSC\msdcsc.exe"C:\Windows\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\MSDCSC\msdcsc.exeC:\Windows\MSDCSC\msdcsc.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad5⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
\Windows\MSDCSC\msdcsc.exeFilesize
398KB
MD5136e24d2e40c6bb49efec2c643f2dbe4
SHA10eb613aee9bd84a91045b01df6e80639b3072497
SHA256d14dc0c863a908b364ddb07dce87c1936d7d6f50f341f1ba72c83342bcdc5a66
SHA5129bcda7a8a883d2aad638ba6e27e315dea9ad3d69659473a8610169179c06635b04d71c3c950257c951e222280ecdd3e66548906f2aa22bf9f30d31187bf95c20
-
memory/1732-0-0x0000000000400000-0x00000000006DBC10-memory.dmpFilesize
2.9MB
-
memory/1732-5-0x0000000002D20000-0x0000000002FFC000-memory.dmpFilesize
2.9MB
-
memory/1732-6-0x0000000000400000-0x00000000006DBC10-memory.dmpFilesize
2.9MB
-
memory/2200-3-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2200-4-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2200-7-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2200-8-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2200-9-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2200-22-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2796-33-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/2796-71-0x0000000000270000-0x0000000000271000-memory.dmpFilesize
4KB
-
memory/2996-30-0x0000000000400000-0x00000000006DBC10-memory.dmpFilesize
2.9MB
-
memory/3004-75-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/3004-76-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/3004-32-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/3004-73-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/3004-72-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/3004-74-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/3004-31-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/3004-29-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/3004-77-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/3004-78-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/3004-80-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/3004-81-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/3004-82-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/3004-83-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/3004-85-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/3004-86-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB