Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 11:43
Static task
static1
Behavioral task
behavioral1
Sample
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe
-
Size
302KB
-
MD5
1f3587ecd974baf1f9f8a26a1e6aa557
-
SHA1
19c60397a27a340d2fc0a5928ed19c680ccb23ed
-
SHA256
9fb02ece86b6cde7ecf2579a209fe20ffdb74d4ad35cd23acbea82b5bd17b439
-
SHA512
233af91910c13397101744bca33c53bb08d0545619d3f759a695caf6a3d31dcd2bfc10a2667e51dd8b014e827318e336dce40962d23760363cf82f0d495605c8
-
SSDEEP
6144:tyuLJOUX8rGYm9rnVduPvxZnHMMFYmOCN0XocbUgyhnvCS9o:tJQmlVduPvx3c8SYhvCd
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-F2XPX1H
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
2WrLoVgVtQNk
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
msdcsc.exemsdcsc.exepid process 3052 msdcsc.exe 2652 msdcsc.exe -
Loads dropped DLL 3 IoCs
Processes:
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exemsdcsc.exepid process 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 3052 msdcsc.exe -
Processes:
resource yara_rule behavioral1/memory/2172-10-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2172-11-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2172-12-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2172-6-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2172-4-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2172-13-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2172-16-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2172-15-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2172-14-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2172-17-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2172-30-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2652-43-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2652-47-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2652-49-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2652-48-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2652-46-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2652-45-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2652-50-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2652-52-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2652-51-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2652-53-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2652-54-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2652-55-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2652-56-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2652-65-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2652-66-0x0000000000400000-0x00000000004BA000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exemsdcsc.exedescription pid process target process PID 2412 set thread context of 2172 2412 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 3052 set thread context of 2652 3052 msdcsc.exe msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeSecurityPrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeSystemtimePrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeBackupPrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeRestorePrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeShutdownPrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeDebugPrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeUndockPrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeManageVolumePrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeImpersonatePrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: 33 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: 34 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: 35 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2652 msdcsc.exe Token: SeSecurityPrivilege 2652 msdcsc.exe Token: SeTakeOwnershipPrivilege 2652 msdcsc.exe Token: SeLoadDriverPrivilege 2652 msdcsc.exe Token: SeSystemProfilePrivilege 2652 msdcsc.exe Token: SeSystemtimePrivilege 2652 msdcsc.exe Token: SeProfSingleProcessPrivilege 2652 msdcsc.exe Token: SeIncBasePriorityPrivilege 2652 msdcsc.exe Token: SeCreatePagefilePrivilege 2652 msdcsc.exe Token: SeBackupPrivilege 2652 msdcsc.exe Token: SeRestorePrivilege 2652 msdcsc.exe Token: SeShutdownPrivilege 2652 msdcsc.exe Token: SeDebugPrivilege 2652 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2652 msdcsc.exe Token: SeChangeNotifyPrivilege 2652 msdcsc.exe Token: SeRemoteShutdownPrivilege 2652 msdcsc.exe Token: SeUndockPrivilege 2652 msdcsc.exe Token: SeManageVolumePrivilege 2652 msdcsc.exe Token: SeImpersonatePrivilege 2652 msdcsc.exe Token: SeCreateGlobalPrivilege 2652 msdcsc.exe Token: 33 2652 msdcsc.exe Token: 34 2652 msdcsc.exe Token: 35 2652 msdcsc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exemsdcsc.exemsdcsc.exepid process 2412 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 3052 msdcsc.exe 2652 msdcsc.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exemsdcsc.exedescription pid process target process PID 2412 wrote to memory of 2172 2412 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 2412 wrote to memory of 2172 2412 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 2412 wrote to memory of 2172 2412 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 2412 wrote to memory of 2172 2412 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 2412 wrote to memory of 2172 2412 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 2412 wrote to memory of 2172 2412 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 2412 wrote to memory of 2172 2412 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 2412 wrote to memory of 2172 2412 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 2172 wrote to memory of 3052 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe msdcsc.exe PID 2172 wrote to memory of 3052 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe msdcsc.exe PID 2172 wrote to memory of 3052 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe msdcsc.exe PID 2172 wrote to memory of 3052 2172 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe msdcsc.exe PID 3052 wrote to memory of 2652 3052 msdcsc.exe msdcsc.exe PID 3052 wrote to memory of 2652 3052 msdcsc.exe msdcsc.exe PID 3052 wrote to memory of 2652 3052 msdcsc.exe msdcsc.exe PID 3052 wrote to memory of 2652 3052 msdcsc.exe msdcsc.exe PID 3052 wrote to memory of 2652 3052 msdcsc.exe msdcsc.exe PID 3052 wrote to memory of 2652 3052 msdcsc.exe msdcsc.exe PID 3052 wrote to memory of 2652 3052 msdcsc.exe msdcsc.exe PID 3052 wrote to memory of 2652 3052 msdcsc.exe msdcsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exeFilesize
302KB
MD51f3587ecd974baf1f9f8a26a1e6aa557
SHA119c60397a27a340d2fc0a5928ed19c680ccb23ed
SHA2569fb02ece86b6cde7ecf2579a209fe20ffdb74d4ad35cd23acbea82b5bd17b439
SHA512233af91910c13397101744bca33c53bb08d0545619d3f759a695caf6a3d31dcd2bfc10a2667e51dd8b014e827318e336dce40962d23760363cf82f0d495605c8
-
memory/2172-2-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2172-12-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2172-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2172-6-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2172-4-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2172-10-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2172-13-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2172-16-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2172-15-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2172-14-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2172-17-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2172-11-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2172-30-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2652-43-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2652-47-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2652-49-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2652-48-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2652-46-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2652-45-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2652-50-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2652-52-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2652-51-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2652-53-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2652-54-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2652-55-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2652-56-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2652-65-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2652-66-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB