Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 13:49
Static task
static1
Behavioral task
behavioral1
Sample
163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe
-
Size
409KB
-
MD5
163a933227fd7a1e61eaf72f18074750
-
SHA1
38d1c60bd98409d2498e81607c351ac287579650
-
SHA256
f32a44c038c2ecc44b898172aac4fb39f1fbdfa87552bc9c991caf0052eb4528
-
SHA512
e207c5fab366a44e324b94856595de1d8d2f0fcaf11926946cd57da30659179222c53696790dd1017e140f3f1c8ba7d4d92090e630bb8f905816e2985bfd130a
-
SSDEEP
6144:NDwD7cY2fgssM7Wirg9KXylmRiL+QMeC/i6isqX7UovnONztByipwxZipY1oceWN:N8l8E4w5huat7UovONzbXwGp6oceWN
Malware Config
Extracted
darkcomet
Guest16
ala-tun.zapto.org:1604
DC_MUTEX-HTT9SRF
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
Roq7Y0w7L9wi
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 4348 msdcsc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 412 2268 WerFault.exe notepad.exe -
Modifies registry class 1 IoCs
Processes:
163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msdcsc.exepid process 4348 msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeSecurityPrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeLoadDriverPrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeSystemProfilePrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeSystemtimePrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeBackupPrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeRestorePrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeShutdownPrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeDebugPrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeUndockPrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeManageVolumePrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeImpersonatePrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: 33 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: 34 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: 35 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: 36 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 4348 msdcsc.exe Token: SeSecurityPrivilege 4348 msdcsc.exe Token: SeTakeOwnershipPrivilege 4348 msdcsc.exe Token: SeLoadDriverPrivilege 4348 msdcsc.exe Token: SeSystemProfilePrivilege 4348 msdcsc.exe Token: SeSystemtimePrivilege 4348 msdcsc.exe Token: SeProfSingleProcessPrivilege 4348 msdcsc.exe Token: SeIncBasePriorityPrivilege 4348 msdcsc.exe Token: SeCreatePagefilePrivilege 4348 msdcsc.exe Token: SeBackupPrivilege 4348 msdcsc.exe Token: SeRestorePrivilege 4348 msdcsc.exe Token: SeShutdownPrivilege 4348 msdcsc.exe Token: SeDebugPrivilege 4348 msdcsc.exe Token: SeSystemEnvironmentPrivilege 4348 msdcsc.exe Token: SeChangeNotifyPrivilege 4348 msdcsc.exe Token: SeRemoteShutdownPrivilege 4348 msdcsc.exe Token: SeUndockPrivilege 4348 msdcsc.exe Token: SeManageVolumePrivilege 4348 msdcsc.exe Token: SeImpersonatePrivilege 4348 msdcsc.exe Token: SeCreateGlobalPrivilege 4348 msdcsc.exe Token: 33 4348 msdcsc.exe Token: 34 4348 msdcsc.exe Token: 35 4348 msdcsc.exe Token: 36 4348 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msdcsc.exepid process 4348 msdcsc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exemsdcsc.exedescription pid process target process PID 1168 wrote to memory of 4348 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe msdcsc.exe PID 1168 wrote to memory of 4348 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe msdcsc.exe PID 1168 wrote to memory of 4348 1168 163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe msdcsc.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe PID 4348 wrote to memory of 2268 4348 msdcsc.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\163a933227fd7a1e61eaf72f18074750_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 4164⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2268 -ip 22681⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
409KB
MD5163a933227fd7a1e61eaf72f18074750
SHA138d1c60bd98409d2498e81607c351ac287579650
SHA256f32a44c038c2ecc44b898172aac4fb39f1fbdfa87552bc9c991caf0052eb4528
SHA512e207c5fab366a44e324b94856595de1d8d2f0fcaf11926946cd57da30659179222c53696790dd1017e140f3f1c8ba7d4d92090e630bb8f905816e2985bfd130a
-
memory/1168-1-0x0000000000750000-0x0000000000751000-memory.dmpFilesize
4KB
-
memory/1168-63-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/1168-0-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/2268-66-0x0000000000AE0000-0x0000000000AE1000-memory.dmpFilesize
4KB
-
memory/4348-71-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/4348-75-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/4348-68-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/4348-69-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/4348-70-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/4348-64-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/4348-72-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/4348-73-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/4348-74-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/4348-65-0x0000000002320000-0x0000000002321000-memory.dmpFilesize
4KB
-
memory/4348-76-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/4348-77-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/4348-78-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/4348-79-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/4348-80-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/4348-81-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB
-
memory/4348-82-0x0000000000400000-0x0000000000507000-memory.dmpFilesize
1.0MB