Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2024 21:25
Static task
static1
Behavioral task
behavioral1
Sample
8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe
-
Size
644KB
-
MD5
8399e22a618497da4fb73205fdecebcd
-
SHA1
7ead998adc1969b7917195e76188bbce7f1c6f4a
-
SHA256
022e216bc025cf6c4dd9b478f81bf6290b933ec78488696f7a9b88199d7739a0
-
SHA512
3e5de840115b3c33dc1b384d3353a8ac933259836cd83c1333e71dde3e6c08a69cd91134903c12ad40b44356c60cbdc077f5fbecc16d43c17cb386dd48becf05
-
SSDEEP
12288:IJdTK+HwbCV94hNQNxfKnvHz50gOVyajK1TTHEB18GmWjApG:IJTh/svHCg2yaSTHq8Pt8
Malware Config
Extracted
darkcomet
Guest16
mw2511.no-ip.info:1604
DC_MUTEX-TC9QD01
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
kWFty2jHXpbm
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\kWFty2jHXpbm\\msdcsc.exe" 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\kWFty2jHXpbm\\msdcsc.exe" 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
notepad.exe8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exedescription pid process Token: SeIncreaseQuotaPrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeSecurityPrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeLoadDriverPrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeSystemProfilePrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeSystemtimePrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeBackupPrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeRestorePrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeShutdownPrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeDebugPrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeUndockPrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeManageVolumePrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeImpersonatePrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: 33 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: 34 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: 35 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe Token: 36 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exepid process 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exedescription pid process target process PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe PID 1104 wrote to memory of 1204 1104 8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8399e22a618497da4fb73205fdecebcd_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Modifies security service
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- System Location Discovery: System Language Discovery
PID:1204
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
4