Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 20:59
Static task
static1
Behavioral task
behavioral1
Sample
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe
-
Size
398KB
-
MD5
136e24d2e40c6bb49efec2c643f2dbe4
-
SHA1
0eb613aee9bd84a91045b01df6e80639b3072497
-
SHA256
d14dc0c863a908b364ddb07dce87c1936d7d6f50f341f1ba72c83342bcdc5a66
-
SHA512
9bcda7a8a883d2aad638ba6e27e315dea9ad3d69659473a8610169179c06635b04d71c3c950257c951e222280ecdd3e66548906f2aa22bf9f30d31187bf95c20
-
SSDEEP
12288:r0eFWYP1stdJTFoKTV45jEJnp2/FB02fHdf:r0evStdEKTV45ss/L9f
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-TDUES14
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
kLFnMeH6GMti
-
install
true
-
offline_keylogger
true
-
password
0123456789
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\MSDCSC\\msdcsc.exe" 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
msdcsc.exemsdcsc.exepid process 788 msdcsc.exe 4072 msdcsc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\MSDCSC\\msdcsc.exe" 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exemsdcsc.exedescription pid process target process PID 2684 set thread context of 2044 2684 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 788 set thread context of 4072 788 msdcsc.exe msdcsc.exe -
Drops file in Windows directory 3 IoCs
Processes:
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\MSDCSC\ 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe File created C:\Windows\MSDCSC\msdcsc.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe File opened for modification C:\Windows\MSDCSC\msdcsc.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msdcsc.exepid process 4072 msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeSecurityPrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeSystemtimePrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeBackupPrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeRestorePrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeShutdownPrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeDebugPrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeUndockPrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeManageVolumePrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeImpersonatePrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: 33 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: 34 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: 35 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: 36 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 4072 msdcsc.exe Token: SeSecurityPrivilege 4072 msdcsc.exe Token: SeTakeOwnershipPrivilege 4072 msdcsc.exe Token: SeLoadDriverPrivilege 4072 msdcsc.exe Token: SeSystemProfilePrivilege 4072 msdcsc.exe Token: SeSystemtimePrivilege 4072 msdcsc.exe Token: SeProfSingleProcessPrivilege 4072 msdcsc.exe Token: SeIncBasePriorityPrivilege 4072 msdcsc.exe Token: SeCreatePagefilePrivilege 4072 msdcsc.exe Token: SeBackupPrivilege 4072 msdcsc.exe Token: SeRestorePrivilege 4072 msdcsc.exe Token: SeShutdownPrivilege 4072 msdcsc.exe Token: SeDebugPrivilege 4072 msdcsc.exe Token: SeSystemEnvironmentPrivilege 4072 msdcsc.exe Token: SeChangeNotifyPrivilege 4072 msdcsc.exe Token: SeRemoteShutdownPrivilege 4072 msdcsc.exe Token: SeUndockPrivilege 4072 msdcsc.exe Token: SeManageVolumePrivilege 4072 msdcsc.exe Token: SeImpersonatePrivilege 4072 msdcsc.exe Token: SeCreateGlobalPrivilege 4072 msdcsc.exe Token: 33 4072 msdcsc.exe Token: 34 4072 msdcsc.exe Token: 35 4072 msdcsc.exe Token: 36 4072 msdcsc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exemsdcsc.exemsdcsc.exepid process 2684 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 788 msdcsc.exe 4072 msdcsc.exe -
Suspicious use of WriteProcessMemory 59 IoCs
Processes:
136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.execmd.exemsdcsc.exemsdcsc.exedescription pid process target process PID 2684 wrote to memory of 2044 2684 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 2684 wrote to memory of 2044 2684 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 2684 wrote to memory of 2044 2684 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 2684 wrote to memory of 2044 2684 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 2684 wrote to memory of 2044 2684 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 2684 wrote to memory of 2044 2684 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 2684 wrote to memory of 2044 2684 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 2684 wrote to memory of 2044 2684 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 2684 wrote to memory of 2044 2684 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 2684 wrote to memory of 2044 2684 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 2684 wrote to memory of 2044 2684 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 2684 wrote to memory of 2044 2684 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 2684 wrote to memory of 2044 2684 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 2684 wrote to memory of 2044 2684 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe PID 2044 wrote to memory of 2820 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe cmd.exe PID 2044 wrote to memory of 2820 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe cmd.exe PID 2044 wrote to memory of 2820 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe cmd.exe PID 2044 wrote to memory of 788 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe msdcsc.exe PID 2044 wrote to memory of 788 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe msdcsc.exe PID 2044 wrote to memory of 788 2044 136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe msdcsc.exe PID 2820 wrote to memory of 1676 2820 cmd.exe attrib.exe PID 2820 wrote to memory of 1676 2820 cmd.exe attrib.exe PID 2820 wrote to memory of 1676 2820 cmd.exe attrib.exe PID 788 wrote to memory of 4072 788 msdcsc.exe msdcsc.exe PID 788 wrote to memory of 4072 788 msdcsc.exe msdcsc.exe PID 788 wrote to memory of 4072 788 msdcsc.exe msdcsc.exe PID 788 wrote to memory of 4072 788 msdcsc.exe msdcsc.exe PID 788 wrote to memory of 4072 788 msdcsc.exe msdcsc.exe PID 788 wrote to memory of 4072 788 msdcsc.exe msdcsc.exe PID 788 wrote to memory of 4072 788 msdcsc.exe msdcsc.exe PID 788 wrote to memory of 4072 788 msdcsc.exe msdcsc.exe PID 788 wrote to memory of 4072 788 msdcsc.exe msdcsc.exe PID 788 wrote to memory of 4072 788 msdcsc.exe msdcsc.exe PID 788 wrote to memory of 4072 788 msdcsc.exe msdcsc.exe PID 788 wrote to memory of 4072 788 msdcsc.exe msdcsc.exe PID 788 wrote to memory of 4072 788 msdcsc.exe msdcsc.exe PID 788 wrote to memory of 4072 788 msdcsc.exe msdcsc.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe PID 4072 wrote to memory of 5060 4072 msdcsc.exe notepad.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\136e24d2e40c6bb49efec2c643f2dbe4_JaffaCakes118.exe2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\MSDCSC\msdcsc.exe"C:\Windows\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\MSDCSC\msdcsc.exeC:\Windows\MSDCSC\msdcsc.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad5⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4460,i,16856304285138459032,14480077487839828721,262144 --variations-seed-version --mojo-platform-channel-handle=3456 /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\MSDCSC\msdcsc.exeFilesize
398KB
MD5136e24d2e40c6bb49efec2c643f2dbe4
SHA10eb613aee9bd84a91045b01df6e80639b3072497
SHA256d14dc0c863a908b364ddb07dce87c1936d7d6f50f341f1ba72c83342bcdc5a66
SHA5129bcda7a8a883d2aad638ba6e27e315dea9ad3d69659473a8610169179c06635b04d71c3c950257c951e222280ecdd3e66548906f2aa22bf9f30d31187bf95c20
-
memory/788-36-0x0000000000400000-0x00000000006DBC10-memory.dmpFilesize
2.9MB
-
memory/788-23-0x0000000000400000-0x00000000006DBC10-memory.dmpFilesize
2.9MB
-
memory/2044-3-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2044-4-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2044-5-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2044-6-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2044-7-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2044-25-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2684-9-0x0000000000400000-0x00000000006DBC10-memory.dmpFilesize
2.9MB
-
memory/2684-0-0x0000000000400000-0x00000000006DBC10-memory.dmpFilesize
2.9MB
-
memory/4072-34-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4072-42-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4072-32-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4072-31-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4072-52-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4072-39-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4072-38-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4072-40-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4072-41-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4072-35-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4072-43-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4072-44-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4072-45-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4072-46-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4072-47-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4072-48-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4072-50-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/4072-51-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/5060-37-0x0000000000D60000-0x0000000000D61000-memory.dmpFilesize
4KB