Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 13:49
Static task
static1
Behavioral task
behavioral1
Sample
163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe
-
Size
409KB
-
MD5
163a933227fd7a1e61eaf72f18074750
-
SHA1
38d1c60bd98409d2498e81607c351ac287579650
-
SHA256
f32a44c038c2ecc44b898172aac4fb39f1fbdfa87552bc9c991caf0052eb4528
-
SHA512
e207c5fab366a44e324b94856595de1d8d2f0fcaf11926946cd57da30659179222c53696790dd1017e140f3f1c8ba7d4d92090e630bb8f905816e2985bfd130a
-
SSDEEP
6144:NDwD7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZipY1oceWN:N8l8E4w5huat7UovONzbXwGp6oceWN
Malware Config
Extracted
darkcomet
Guest16
ala-tun.zapto.org:1604
DC_MUTEX-HTT9SRF
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
Roq7Y0w7L9wi
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 2688 msdcsc.exe -
Loads dropped DLL 2 IoCs
Processes:
163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exepid process 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2388 2736 WerFault.exe notepad.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msdcsc.exepid process 2688 msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeSecurityPrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeSystemtimePrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeBackupPrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeRestorePrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeShutdownPrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeDebugPrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeUndockPrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeManageVolumePrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeImpersonatePrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: 33 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: 34 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: 35 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2688 msdcsc.exe Token: SeSecurityPrivilege 2688 msdcsc.exe Token: SeTakeOwnershipPrivilege 2688 msdcsc.exe Token: SeLoadDriverPrivilege 2688 msdcsc.exe Token: SeSystemProfilePrivilege 2688 msdcsc.exe Token: SeSystemtimePrivilege 2688 msdcsc.exe Token: SeProfSingleProcessPrivilege 2688 msdcsc.exe Token: SeIncBasePriorityPrivilege 2688 msdcsc.exe Token: SeCreatePagefilePrivilege 2688 msdcsc.exe Token: SeBackupPrivilege 2688 msdcsc.exe Token: SeRestorePrivilege 2688 msdcsc.exe Token: SeShutdownPrivilege 2688 msdcsc.exe Token: SeDebugPrivilege 2688 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2688 msdcsc.exe Token: SeChangeNotifyPrivilege 2688 msdcsc.exe Token: SeRemoteShutdownPrivilege 2688 msdcsc.exe Token: SeUndockPrivilege 2688 msdcsc.exe Token: SeManageVolumePrivilege 2688 msdcsc.exe Token: SeImpersonatePrivilege 2688 msdcsc.exe Token: SeCreateGlobalPrivilege 2688 msdcsc.exe Token: 33 2688 msdcsc.exe Token: 34 2688 msdcsc.exe Token: 35 2688 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msdcsc.exepid process 2688 msdcsc.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exemsdcsc.exenotepad.exedescription pid process target process PID 2096 wrote to memory of 2688 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe msdcsc.exe PID 2096 wrote to memory of 2688 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe msdcsc.exe PID 2096 wrote to memory of 2688 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe msdcsc.exe PID 2096 wrote to memory of 2688 2096 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe msdcsc.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2688 wrote to memory of 2736 2688 msdcsc.exe notepad.exe PID 2736 wrote to memory of 2388 2736 notepad.exe WerFault.exe PID 2736 wrote to memory of 2388 2736 notepad.exe WerFault.exe PID 2736 wrote to memory of 2388 2736 notepad.exe WerFault.exe PID 2736 wrote to memory of 2388 2736 notepad.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 2564⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
409KB
MD5163a933227fd7a1e61eaf72f18074750
SHA138d1c60bd98409d2498e81607c351ac287579650
SHA256f32a44c038c2ecc44b898172aac4fb39f1fbdfa87552bc9c991caf0052eb4528
SHA512e207c5fab366a44e324b94856595de1d8d2f0fcaf11926946cd57da30659179222c53696790dd1017e140f3f1c8ba7d4d92090e630bb8f905816e2985bfd130a
-
memory/2096-0-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2096-1-0x0000000001C30000-0x0000000001C31000-memory.dmpFilesize
4KB
-
memory/2096-7-0x0000000005150000-0x0000000005257000-memory.dmpFilesize
1.0MB
-
memory/2096-14-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2688-57-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2688-61-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2688-68-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2688-55-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2688-56-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2688-15-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2688-58-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2688-59-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2688-60-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2688-67-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2688-62-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2688-63-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2688-64-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2688-65-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2688-66-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2736-16-0x00000000000C0000-0x00000000000C1000-memory.dmpFilesize
4KB
-
memory/2736-54-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB