Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2024 11:43
Static task
static1
Behavioral task
behavioral1
Sample
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe
-
Size
302KB
-
MD5
1f3587ecd974baf1f9f8a26a1e6aa557
-
SHA1
19c60397a27a340d2fc0a5928ed19c680ccb23ed
-
SHA256
9fb02ece86b6cde7ecf2579a209fe20ffdb74d4ad35cd23acbea82b5bd17b439
-
SHA512
233af91910c13397101744bca33c53bb08d0545619d3f759a695caf6a3d31dcd2bfc10a2667e51dd8b014e827318e336dce40962d23760363cf82f0d495605c8
-
SSDEEP
6144:tyuLJOUX8rGYm9rnVduPvxZnHMMFYmOCN0XocbUgyhnvCS9o:tJQmlVduPvx3c8SYhvCd
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-F2XPX1H
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
2WrLoVgVtQNk
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
msdcsc.exemsdcsc.exepid process 4636 msdcsc.exe 3036 msdcsc.exe -
Processes:
resource yara_rule behavioral2/memory/1500-2-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/1500-3-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/1500-4-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/1500-5-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/1500-6-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/1500-7-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/1500-18-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-28-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-27-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-31-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-30-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-29-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-32-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-34-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-35-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-37-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-38-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-39-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-40-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-41-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-42-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-43-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-44-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-45-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral2/memory/3036-46-0x0000000000400000-0x00000000004BA000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exemsdcsc.exedescription pid process target process PID 2976 set thread context of 1500 2976 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 4636 set thread context of 3036 4636 msdcsc.exe msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeSecurityPrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeLoadDriverPrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeSystemProfilePrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeSystemtimePrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeBackupPrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeRestorePrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeShutdownPrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeDebugPrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeUndockPrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeManageVolumePrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeImpersonatePrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: 33 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: 34 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: 35 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: 36 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 3036 msdcsc.exe Token: SeSecurityPrivilege 3036 msdcsc.exe Token: SeTakeOwnershipPrivilege 3036 msdcsc.exe Token: SeLoadDriverPrivilege 3036 msdcsc.exe Token: SeSystemProfilePrivilege 3036 msdcsc.exe Token: SeSystemtimePrivilege 3036 msdcsc.exe Token: SeProfSingleProcessPrivilege 3036 msdcsc.exe Token: SeIncBasePriorityPrivilege 3036 msdcsc.exe Token: SeCreatePagefilePrivilege 3036 msdcsc.exe Token: SeBackupPrivilege 3036 msdcsc.exe Token: SeRestorePrivilege 3036 msdcsc.exe Token: SeShutdownPrivilege 3036 msdcsc.exe Token: SeDebugPrivilege 3036 msdcsc.exe Token: SeSystemEnvironmentPrivilege 3036 msdcsc.exe Token: SeChangeNotifyPrivilege 3036 msdcsc.exe Token: SeRemoteShutdownPrivilege 3036 msdcsc.exe Token: SeUndockPrivilege 3036 msdcsc.exe Token: SeManageVolumePrivilege 3036 msdcsc.exe Token: SeImpersonatePrivilege 3036 msdcsc.exe Token: SeCreateGlobalPrivilege 3036 msdcsc.exe Token: 33 3036 msdcsc.exe Token: 34 3036 msdcsc.exe Token: 35 3036 msdcsc.exe Token: 36 3036 msdcsc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exemsdcsc.exemsdcsc.exepid process 2976 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 4636 msdcsc.exe 3036 msdcsc.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exemsdcsc.exedescription pid process target process PID 2976 wrote to memory of 1500 2976 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 2976 wrote to memory of 1500 2976 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 2976 wrote to memory of 1500 2976 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 2976 wrote to memory of 1500 2976 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 2976 wrote to memory of 1500 2976 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 2976 wrote to memory of 1500 2976 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 2976 wrote to memory of 1500 2976 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 2976 wrote to memory of 1500 2976 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe PID 1500 wrote to memory of 4636 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe msdcsc.exe PID 1500 wrote to memory of 4636 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe msdcsc.exe PID 1500 wrote to memory of 4636 1500 1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe msdcsc.exe PID 4636 wrote to memory of 3036 4636 msdcsc.exe msdcsc.exe PID 4636 wrote to memory of 3036 4636 msdcsc.exe msdcsc.exe PID 4636 wrote to memory of 3036 4636 msdcsc.exe msdcsc.exe PID 4636 wrote to memory of 3036 4636 msdcsc.exe msdcsc.exe PID 4636 wrote to memory of 3036 4636 msdcsc.exe msdcsc.exe PID 4636 wrote to memory of 3036 4636 msdcsc.exe msdcsc.exe PID 4636 wrote to memory of 3036 4636 msdcsc.exe msdcsc.exe PID 4636 wrote to memory of 3036 4636 msdcsc.exe msdcsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1f3587ecd974baf1f9f8a26a1e6aa557_JaffaCakes118.exe2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exeFilesize
302KB
MD51f3587ecd974baf1f9f8a26a1e6aa557
SHA119c60397a27a340d2fc0a5928ed19c680ccb23ed
SHA2569fb02ece86b6cde7ecf2579a209fe20ffdb74d4ad35cd23acbea82b5bd17b439
SHA512233af91910c13397101744bca33c53bb08d0545619d3f759a695caf6a3d31dcd2bfc10a2667e51dd8b014e827318e336dce40962d23760363cf82f0d495605c8
-
memory/1500-2-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/1500-3-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/1500-4-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/1500-5-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/1500-6-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/1500-7-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/1500-18-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-29-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-38-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-31-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-30-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-28-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-32-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-34-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-35-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-37-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-27-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-39-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-40-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-41-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-42-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-43-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-44-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-45-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3036-46-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB