Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 02:20
Behavioral task
behavioral1
Sample
1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe
-
Size
748KB
-
MD5
1455792a7bf29cc929014c720d999f90
-
SHA1
87b9a5187ed8684bcba977cb250d8fbdb5bd331f
-
SHA256
c7a92e58954faf2a030b8be24bbe012e7fa95f8bf32d3e9cb04107208d8ff80d
-
SHA512
6bdc25f97e3bcb54fe613e3dc51d4fef999677f95999e3d3d33fc25484befd6cc5922570dd91e195ae7c867f1ca8d15554cafe0c5f5ef2820b5d8036978e0fb0
-
SSDEEP
12288:mk0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/9/+S:L0QRWoJEfg0oChGdJQbjPbNW5tYeP+G/
Malware Config
Extracted
darkcomet
Guest16
mathiasrats1.no-ip.org:1604
DC_MUTEX-Z6H69NS
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
1jNHiSy22ogX
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
1455792a7bf29cc929014c720d999f90_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe -
Disables RegEdit via registry modification 2 IoCs
Processes:
iexplore.exemsdcsc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msdcsc.exe -
Disables Task Manager via registry modification
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2520 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 2612 msdcsc.exe -
Loads dropped DLL 2 IoCs
Processes:
1455792a7bf29cc929014c720d999f90_JaffaCakes118.exepid process 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1455792a7bf29cc929014c720d999f90_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
msdcsc.exedescription pid process target process PID 2612 set thread context of 2632 2612 msdcsc.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
1455792a7bf29cc929014c720d999f90_JaffaCakes118.exemsdcsc.exeiexplore.exedescription pid process Token: SeIncreaseQuotaPrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeSecurityPrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeLoadDriverPrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeSystemProfilePrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeSystemtimePrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeBackupPrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeRestorePrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeShutdownPrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeDebugPrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeUndockPrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeManageVolumePrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeImpersonatePrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: 33 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: 34 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: 35 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2612 msdcsc.exe Token: SeSecurityPrivilege 2612 msdcsc.exe Token: SeTakeOwnershipPrivilege 2612 msdcsc.exe Token: SeLoadDriverPrivilege 2612 msdcsc.exe Token: SeSystemProfilePrivilege 2612 msdcsc.exe Token: SeSystemtimePrivilege 2612 msdcsc.exe Token: SeProfSingleProcessPrivilege 2612 msdcsc.exe Token: SeIncBasePriorityPrivilege 2612 msdcsc.exe Token: SeCreatePagefilePrivilege 2612 msdcsc.exe Token: SeBackupPrivilege 2612 msdcsc.exe Token: SeRestorePrivilege 2612 msdcsc.exe Token: SeShutdownPrivilege 2612 msdcsc.exe Token: SeDebugPrivilege 2612 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2612 msdcsc.exe Token: SeChangeNotifyPrivilege 2612 msdcsc.exe Token: SeRemoteShutdownPrivilege 2612 msdcsc.exe Token: SeUndockPrivilege 2612 msdcsc.exe Token: SeManageVolumePrivilege 2612 msdcsc.exe Token: SeImpersonatePrivilege 2612 msdcsc.exe Token: SeCreateGlobalPrivilege 2612 msdcsc.exe Token: 33 2612 msdcsc.exe Token: 34 2612 msdcsc.exe Token: 35 2612 msdcsc.exe Token: SeIncreaseQuotaPrivilege 2632 iexplore.exe Token: SeSecurityPrivilege 2632 iexplore.exe Token: SeTakeOwnershipPrivilege 2632 iexplore.exe Token: SeLoadDriverPrivilege 2632 iexplore.exe Token: SeSystemProfilePrivilege 2632 iexplore.exe Token: SeSystemtimePrivilege 2632 iexplore.exe Token: SeProfSingleProcessPrivilege 2632 iexplore.exe Token: SeIncBasePriorityPrivilege 2632 iexplore.exe Token: SeCreatePagefilePrivilege 2632 iexplore.exe Token: SeBackupPrivilege 2632 iexplore.exe Token: SeRestorePrivilege 2632 iexplore.exe Token: SeShutdownPrivilege 2632 iexplore.exe Token: SeDebugPrivilege 2632 iexplore.exe Token: SeSystemEnvironmentPrivilege 2632 iexplore.exe Token: SeChangeNotifyPrivilege 2632 iexplore.exe Token: SeRemoteShutdownPrivilege 2632 iexplore.exe Token: SeUndockPrivilege 2632 iexplore.exe Token: SeManageVolumePrivilege 2632 iexplore.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
1455792a7bf29cc929014c720d999f90_JaffaCakes118.exemsdcsc.execmd.exedescription pid process target process PID 1888 wrote to memory of 2520 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe cmd.exe PID 1888 wrote to memory of 2520 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe cmd.exe PID 1888 wrote to memory of 2520 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe cmd.exe PID 1888 wrote to memory of 2520 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe cmd.exe PID 1888 wrote to memory of 2612 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe msdcsc.exe PID 1888 wrote to memory of 2612 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe msdcsc.exe PID 1888 wrote to memory of 2612 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe msdcsc.exe PID 1888 wrote to memory of 2612 1888 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe msdcsc.exe PID 2612 wrote to memory of 2632 2612 msdcsc.exe iexplore.exe PID 2612 wrote to memory of 2632 2612 msdcsc.exe iexplore.exe PID 2612 wrote to memory of 2632 2612 msdcsc.exe iexplore.exe PID 2612 wrote to memory of 2632 2612 msdcsc.exe iexplore.exe PID 2612 wrote to memory of 2632 2612 msdcsc.exe iexplore.exe PID 2612 wrote to memory of 2632 2612 msdcsc.exe iexplore.exe PID 2520 wrote to memory of 2552 2520 cmd.exe PING.EXE PID 2520 wrote to memory of 2552 2520 cmd.exe PING.EXE PID 2520 wrote to memory of 2552 2520 cmd.exe PING.EXE PID 2520 wrote to memory of 2552 2520 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Users\Admin\AppData\Local\Temp\1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 43⤵
- Runs ping.exe
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Disables RegEdit via registry modification
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
748KB
MD51455792a7bf29cc929014c720d999f90
SHA187b9a5187ed8684bcba977cb250d8fbdb5bd331f
SHA256c7a92e58954faf2a030b8be24bbe012e7fa95f8bf32d3e9cb04107208d8ff80d
SHA5126bdc25f97e3bcb54fe613e3dc51d4fef999677f95999e3d3d33fc25484befd6cc5922570dd91e195ae7c867f1ca8d15554cafe0c5f5ef2820b5d8036978e0fb0
-
memory/1888-0-0x00000000003E0000-0x00000000003E1000-memory.dmpFilesize
4KB
-
memory/1888-11-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/2612-15-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/2612-12-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/2632-14-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB