Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 08:19
Behavioral task
behavioral1
Sample
1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe
-
Size
660KB
-
MD5
1a9312e9567b3b451f32ba3fd565ab7b
-
SHA1
fe015bbe0a184cdae973367ab4677dae8733f59d
-
SHA256
1789998bb071465f1ecfe9b73e97474951215270818727a11783bdff1fa6f250
-
SHA512
436a17d4ca398291a9deb1cf9686afbf2d0ca4c3f380a8423e07db9f604db6bd08fb995b14fe2fab8e393d62d541ba07651f8fc7ed6f862c2adfca53f358ef61
-
SSDEEP
12288:8XhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy452Ua:qnAw2WWeFcfbP9VPSPMTSPL/rWvzq4JK
Malware Config
Extracted
darkcomet
Guest16
gangsterjocke57.no-ip.biz:1604
DC_MUTEX-GWQY273
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
N6AcxbEk45wx
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
msdcsc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" msdcsc.exe -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
msdcsc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msdcsc.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 2560 attrib.exe 2356 attrib.exe -
Deletes itself 1 IoCs
Processes:
notepad.exepid process 2444 notepad.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 2452 msdcsc.exe -
Loads dropped DLL 2 IoCs
Processes:
1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exepid process 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeSecurityPrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeSystemtimePrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeBackupPrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeRestorePrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeShutdownPrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeDebugPrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeUndockPrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeManageVolumePrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeImpersonatePrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: 33 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: 34 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: 35 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2452 msdcsc.exe Token: SeSecurityPrivilege 2452 msdcsc.exe Token: SeTakeOwnershipPrivilege 2452 msdcsc.exe Token: SeLoadDriverPrivilege 2452 msdcsc.exe Token: SeSystemProfilePrivilege 2452 msdcsc.exe Token: SeSystemtimePrivilege 2452 msdcsc.exe Token: SeProfSingleProcessPrivilege 2452 msdcsc.exe Token: SeIncBasePriorityPrivilege 2452 msdcsc.exe Token: SeCreatePagefilePrivilege 2452 msdcsc.exe Token: SeBackupPrivilege 2452 msdcsc.exe Token: SeRestorePrivilege 2452 msdcsc.exe Token: SeShutdownPrivilege 2452 msdcsc.exe Token: SeDebugPrivilege 2452 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2452 msdcsc.exe Token: SeChangeNotifyPrivilege 2452 msdcsc.exe Token: SeRemoteShutdownPrivilege 2452 msdcsc.exe Token: SeUndockPrivilege 2452 msdcsc.exe Token: SeManageVolumePrivilege 2452 msdcsc.exe Token: SeImpersonatePrivilege 2452 msdcsc.exe Token: SeCreateGlobalPrivilege 2452 msdcsc.exe Token: 33 2452 msdcsc.exe Token: 34 2452 msdcsc.exe Token: 35 2452 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msdcsc.exepid process 2452 msdcsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.execmd.execmd.exemsdcsc.exedescription pid process target process PID 2780 wrote to memory of 2092 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe cmd.exe PID 2780 wrote to memory of 2092 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe cmd.exe PID 2780 wrote to memory of 2092 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe cmd.exe PID 2780 wrote to memory of 2092 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe cmd.exe PID 2780 wrote to memory of 2948 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe cmd.exe PID 2780 wrote to memory of 2948 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe cmd.exe PID 2780 wrote to memory of 2948 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe cmd.exe PID 2780 wrote to memory of 2948 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe cmd.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2444 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe notepad.exe PID 2780 wrote to memory of 2452 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe msdcsc.exe PID 2780 wrote to memory of 2452 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe msdcsc.exe PID 2780 wrote to memory of 2452 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe msdcsc.exe PID 2780 wrote to memory of 2452 2780 1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe msdcsc.exe PID 2092 wrote to memory of 2560 2092 cmd.exe attrib.exe PID 2092 wrote to memory of 2560 2092 cmd.exe attrib.exe PID 2092 wrote to memory of 2560 2092 cmd.exe attrib.exe PID 2092 wrote to memory of 2560 2092 cmd.exe attrib.exe PID 2948 wrote to memory of 2356 2948 cmd.exe attrib.exe PID 2948 wrote to memory of 2356 2948 cmd.exe attrib.exe PID 2948 wrote to memory of 2356 2948 cmd.exe attrib.exe PID 2948 wrote to memory of 2356 2948 cmd.exe attrib.exe PID 2452 wrote to memory of 2376 2452 msdcsc.exe iexplore.exe PID 2452 wrote to memory of 2376 2452 msdcsc.exe iexplore.exe PID 2452 wrote to memory of 2376 2452 msdcsc.exe iexplore.exe PID 2452 wrote to memory of 2376 2452 msdcsc.exe iexplore.exe PID 2452 wrote to memory of 2388 2452 msdcsc.exe explorer.exe PID 2452 wrote to memory of 2388 2452 msdcsc.exe explorer.exe PID 2452 wrote to memory of 2388 2452 msdcsc.exe explorer.exe PID 2452 wrote to memory of 2388 2452 msdcsc.exe explorer.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe PID 2452 wrote to memory of 1652 2452 msdcsc.exe notepad.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 2560 attrib.exe 2356 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\1a9312e9567b3b451f32ba3fd565ab7b_JaffaCakes118.exe" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- Deletes itself
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"2⤵
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
660KB
MD51a9312e9567b3b451f32ba3fd565ab7b
SHA1fe015bbe0a184cdae973367ab4677dae8733f59d
SHA2561789998bb071465f1ecfe9b73e97474951215270818727a11783bdff1fa6f250
SHA512436a17d4ca398291a9deb1cf9686afbf2d0ca4c3f380a8423e07db9f604db6bd08fb995b14fe2fab8e393d62d541ba07651f8fc7ed6f862c2adfca53f358ef61
-
memory/1652-68-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/2444-18-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/2444-3-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/2452-69-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2452-70-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2452-71-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2452-72-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2452-73-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2452-74-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2452-75-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2780-27-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2780-0-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB