Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 00:26
Behavioral task
behavioral1
Sample
2a56336d14687561184b0261a20d4608_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
2a56336d14687561184b0261a20d4608_JaffaCakes118.exe
-
Size
251KB
-
MD5
2a56336d14687561184b0261a20d4608
-
SHA1
21b870ce986e15fb6a0e1feeb540a85c80ed952d
-
SHA256
d9e52e956ead8a1836a176dec93351acf8aeca690f8505ef0501bf1ff3ef0193
-
SHA512
c76d0c92f1e112e219557791f84537ade94cd81be2235303f2683fbf7b29d5b620d019426625c6fb49e90736402c6e830d67cab9ffed98137469f85f5c15f544
-
SSDEEP
6144:dRJQPYYabU6vUpFC0oc3kTyC8oh4rtTYRpVk5x:dYYP4C9IkTypoh4h
Malware Config
Extracted
darkcomet
Guest16
stevecarl2010.zapto.org:21
DC_MUTEX-5G40BDR
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
d3ykdxuhewG2
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Extracted
latentbot
stevecarl2010.zapto.org
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2528 msdcsc.exe -
Loads dropped DLL 2 IoCs
pid Process 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2408-0-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/files/0x00070000000186ed-5.dat upx behavioral1/memory/2528-15-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2408-12-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/1796-18-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/2528-20-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2528 set thread context of 1796 2528 msdcsc.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeSecurityPrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeSystemtimePrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeBackupPrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeRestorePrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeShutdownPrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeDebugPrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeUndockPrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeManageVolumePrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeImpersonatePrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: 33 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: 34 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: 35 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2528 msdcsc.exe Token: SeSecurityPrivilege 2528 msdcsc.exe Token: SeTakeOwnershipPrivilege 2528 msdcsc.exe Token: SeLoadDriverPrivilege 2528 msdcsc.exe Token: SeSystemProfilePrivilege 2528 msdcsc.exe Token: SeSystemtimePrivilege 2528 msdcsc.exe Token: SeProfSingleProcessPrivilege 2528 msdcsc.exe Token: SeIncBasePriorityPrivilege 2528 msdcsc.exe Token: SeCreatePagefilePrivilege 2528 msdcsc.exe Token: SeBackupPrivilege 2528 msdcsc.exe Token: SeRestorePrivilege 2528 msdcsc.exe Token: SeShutdownPrivilege 2528 msdcsc.exe Token: SeDebugPrivilege 2528 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2528 msdcsc.exe Token: SeChangeNotifyPrivilege 2528 msdcsc.exe Token: SeRemoteShutdownPrivilege 2528 msdcsc.exe Token: SeUndockPrivilege 2528 msdcsc.exe Token: SeManageVolumePrivilege 2528 msdcsc.exe Token: SeImpersonatePrivilege 2528 msdcsc.exe Token: SeCreateGlobalPrivilege 2528 msdcsc.exe Token: 33 2528 msdcsc.exe Token: 34 2528 msdcsc.exe Token: 35 2528 msdcsc.exe Token: SeIncreaseQuotaPrivilege 1796 iexplore.exe Token: SeSecurityPrivilege 1796 iexplore.exe Token: SeTakeOwnershipPrivilege 1796 iexplore.exe Token: SeLoadDriverPrivilege 1796 iexplore.exe Token: SeSystemProfilePrivilege 1796 iexplore.exe Token: SeSystemtimePrivilege 1796 iexplore.exe Token: SeProfSingleProcessPrivilege 1796 iexplore.exe Token: SeIncBasePriorityPrivilege 1796 iexplore.exe Token: SeCreatePagefilePrivilege 1796 iexplore.exe Token: SeBackupPrivilege 1796 iexplore.exe Token: SeRestorePrivilege 1796 iexplore.exe Token: SeShutdownPrivilege 1796 iexplore.exe Token: SeDebugPrivilege 1796 iexplore.exe Token: SeSystemEnvironmentPrivilege 1796 iexplore.exe Token: SeChangeNotifyPrivilege 1796 iexplore.exe Token: SeRemoteShutdownPrivilege 1796 iexplore.exe Token: SeUndockPrivilege 1796 iexplore.exe Token: SeManageVolumePrivilege 1796 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1796 iexplore.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2528 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2528 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2528 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2528 2408 2a56336d14687561184b0261a20d4608_JaffaCakes118.exe 30 PID 2528 wrote to memory of 1796 2528 msdcsc.exe 31 PID 2528 wrote to memory of 1796 2528 msdcsc.exe 31 PID 2528 wrote to memory of 1796 2528 msdcsc.exe 31 PID 2528 wrote to memory of 1796 2528 msdcsc.exe 31 PID 2528 wrote to memory of 1796 2528 msdcsc.exe 31 PID 2528 wrote to memory of 1796 2528 msdcsc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a56336d14687561184b0261a20d4608_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a56336d14687561184b0261a20d4608_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD52a56336d14687561184b0261a20d4608
SHA121b870ce986e15fb6a0e1feeb540a85c80ed952d
SHA256d9e52e956ead8a1836a176dec93351acf8aeca690f8505ef0501bf1ff3ef0193
SHA512c76d0c92f1e112e219557791f84537ade94cd81be2235303f2683fbf7b29d5b620d019426625c6fb49e90736402c6e830d67cab9ffed98137469f85f5c15f544