Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 02:20
Behavioral task
behavioral1
Sample
1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe
-
Size
748KB
-
MD5
1455792a7bf29cc929014c720d999f90
-
SHA1
87b9a5187ed8684bcba977cb250d8fbdb5bd331f
-
SHA256
c7a92e58954faf2a030b8be24bbe012e7fa95f8bf32d3e9cb04107208d8ff80d
-
SHA512
6bdc25f97e3bcb54fe613e3dc51d4fef999677f95999e3d3d33fc25484befd6cc5922570dd91e195ae7c867f1ca8d15554cafe0c5f5ef2820b5d8036978e0fb0
-
SSDEEP
12288:mk0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/9/+S:L0QRWoJEfg0oChGdJQbjPbNW5tYeP+G/
Malware Config
Extracted
darkcomet
Guest16
mathiasrats1.no-ip.org:1604
DC_MUTEX-Z6H69NS
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
1jNHiSy22ogX
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
1455792a7bf29cc929014c720d999f90_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
msdcsc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msdcsc.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1455792a7bf29cc929014c720d999f90_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 3716 msdcsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1455792a7bf29cc929014c720d999f90_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
1455792a7bf29cc929014c720d999f90_JaffaCakes118.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeSecurityPrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeLoadDriverPrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeSystemProfilePrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeSystemtimePrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeBackupPrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeRestorePrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeShutdownPrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeDebugPrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeUndockPrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeManageVolumePrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeImpersonatePrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: 33 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: 34 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: 35 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: 36 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 3716 msdcsc.exe Token: SeSecurityPrivilege 3716 msdcsc.exe Token: SeTakeOwnershipPrivilege 3716 msdcsc.exe Token: SeLoadDriverPrivilege 3716 msdcsc.exe Token: SeSystemProfilePrivilege 3716 msdcsc.exe Token: SeSystemtimePrivilege 3716 msdcsc.exe Token: SeProfSingleProcessPrivilege 3716 msdcsc.exe Token: SeIncBasePriorityPrivilege 3716 msdcsc.exe Token: SeCreatePagefilePrivilege 3716 msdcsc.exe Token: SeBackupPrivilege 3716 msdcsc.exe Token: SeRestorePrivilege 3716 msdcsc.exe Token: SeShutdownPrivilege 3716 msdcsc.exe Token: SeDebugPrivilege 3716 msdcsc.exe Token: SeSystemEnvironmentPrivilege 3716 msdcsc.exe Token: SeChangeNotifyPrivilege 3716 msdcsc.exe Token: SeRemoteShutdownPrivilege 3716 msdcsc.exe Token: SeUndockPrivilege 3716 msdcsc.exe Token: SeManageVolumePrivilege 3716 msdcsc.exe Token: SeImpersonatePrivilege 3716 msdcsc.exe Token: SeCreateGlobalPrivilege 3716 msdcsc.exe Token: 33 3716 msdcsc.exe Token: 34 3716 msdcsc.exe Token: 35 3716 msdcsc.exe Token: 36 3716 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msdcsc.exepid process 3716 msdcsc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
1455792a7bf29cc929014c720d999f90_JaffaCakes118.execmd.exemsdcsc.exedescription pid process target process PID 8 wrote to memory of 3832 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe cmd.exe PID 8 wrote to memory of 3832 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe cmd.exe PID 8 wrote to memory of 3832 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe cmd.exe PID 8 wrote to memory of 3716 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe msdcsc.exe PID 8 wrote to memory of 3716 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe msdcsc.exe PID 8 wrote to memory of 3716 8 1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe msdcsc.exe PID 3832 wrote to memory of 2276 3832 cmd.exe PING.EXE PID 3832 wrote to memory of 2276 3832 cmd.exe PING.EXE PID 3832 wrote to memory of 2276 3832 cmd.exe PING.EXE PID 3716 wrote to memory of 1992 3716 msdcsc.exe iexplore.exe PID 3716 wrote to memory of 1992 3716 msdcsc.exe iexplore.exe PID 3716 wrote to memory of 1992 3716 msdcsc.exe iexplore.exe PID 3716 wrote to memory of 4820 3716 msdcsc.exe explorer.exe PID 3716 wrote to memory of 4820 3716 msdcsc.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Users\Admin\AppData\Local\Temp\1455792a7bf29cc929014c720d999f90_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 43⤵
- Runs ping.exe
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"2⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1064,i,3549704109630749084,1975543916261970610,262144 --variations-seed-version --mojo-platform-channel-handle=1444 /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
748KB
MD51455792a7bf29cc929014c720d999f90
SHA187b9a5187ed8684bcba977cb250d8fbdb5bd331f
SHA256c7a92e58954faf2a030b8be24bbe012e7fa95f8bf32d3e9cb04107208d8ff80d
SHA5126bdc25f97e3bcb54fe613e3dc51d4fef999677f95999e3d3d33fc25484befd6cc5922570dd91e195ae7c867f1ca8d15554cafe0c5f5ef2820b5d8036978e0fb0
-
memory/8-0-0x0000000002280000-0x0000000002281000-memory.dmpFilesize
4KB
-
memory/8-13-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/3716-19-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/3716-21-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/3716-16-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/3716-17-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/3716-18-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/3716-14-0x0000000002090000-0x0000000002091000-memory.dmpFilesize
4KB
-
memory/3716-20-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/3716-15-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/3716-22-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/3716-23-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/3716-24-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/3716-25-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/3716-26-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/3716-27-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/3716-28-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB