Analysis
-
max time kernel
96s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
17a962c5ce396b28847e3cc78a3c7a41
-
SHA1
1891f2dfe6d03e0d5ca2000478c3e3b838c53bd1
-
SHA256
e7acd4cea0465cf1ae8ab649003b4fbf4ebef8a1f6523703d9ce727186316dad
-
SHA512
78ca120ddc6fba175fa7f4f8c283090dbea7419f8a21e7e91d8727f22a0395e23cd856cf49c7bf191e96b8886e240f15130047c76871e3bde72a16a7b927d704
-
SSDEEP
24576:cqK2zFhJVboggxl916FyanFDwxjK1eDWD7fJ:jBhJF7gxl916Fy1xjK1eD8fJ
Malware Config
Extracted
darkcomet
Guest16
rafag9.no-ip.org:82
DC_MUTEX-F54S21D
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
23r1xY1998Cv
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" win43.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation win43.exe -
Executes dropped EXE 2 IoCs
pid Process 524 win43.exe 5088 msdcsc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\runAPI83 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\runAPI68.exe\"" 17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" win43.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1564 set thread context of 524 1564 17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 524 win43.exe Token: SeSecurityPrivilege 524 win43.exe Token: SeTakeOwnershipPrivilege 524 win43.exe Token: SeLoadDriverPrivilege 524 win43.exe Token: SeSystemProfilePrivilege 524 win43.exe Token: SeSystemtimePrivilege 524 win43.exe Token: SeProfSingleProcessPrivilege 524 win43.exe Token: SeIncBasePriorityPrivilege 524 win43.exe Token: SeCreatePagefilePrivilege 524 win43.exe Token: SeBackupPrivilege 524 win43.exe Token: SeRestorePrivilege 524 win43.exe Token: SeShutdownPrivilege 524 win43.exe Token: SeDebugPrivilege 524 win43.exe Token: SeSystemEnvironmentPrivilege 524 win43.exe Token: SeChangeNotifyPrivilege 524 win43.exe Token: SeRemoteShutdownPrivilege 524 win43.exe Token: SeUndockPrivilege 524 win43.exe Token: SeManageVolumePrivilege 524 win43.exe Token: SeImpersonatePrivilege 524 win43.exe Token: SeCreateGlobalPrivilege 524 win43.exe Token: 33 524 win43.exe Token: 34 524 win43.exe Token: 35 524 win43.exe Token: 36 524 win43.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1564 wrote to memory of 524 1564 17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe 82 PID 1564 wrote to memory of 524 1564 17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe 82 PID 1564 wrote to memory of 524 1564 17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe 82 PID 1564 wrote to memory of 524 1564 17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe 82 PID 1564 wrote to memory of 524 1564 17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe 82 PID 1564 wrote to memory of 524 1564 17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe 82 PID 1564 wrote to memory of 524 1564 17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe 82 PID 1564 wrote to memory of 524 1564 17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe 82 PID 1564 wrote to memory of 524 1564 17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe 82 PID 1564 wrote to memory of 524 1564 17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe 82 PID 1564 wrote to memory of 524 1564 17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe 82 PID 1564 wrote to memory of 524 1564 17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe 82 PID 1564 wrote to memory of 524 1564 17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe 82 PID 1564 wrote to memory of 524 1564 17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe 82 PID 524 wrote to memory of 5088 524 win43.exe 83 PID 524 wrote to memory of 5088 524 win43.exe 83 PID 524 wrote to memory of 5088 524 win43.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\17a962c5ce396b28847e3cc78a3c7a41_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\win43.exeC:\Users\Admin\AppData\Local\Temp\win43.exe2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5088
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD55e5ecae8b08152c885904cde71c50dad
SHA1727f24d102ab29be690c783ddc149b3a39430fb6
SHA256b3550952a2474802ae5f2d2d7e75987ccd7ca23baa8ba015c3eaa6fd04b55541
SHA512dd6287a8471aa575abbcf46300ac64a170c0cb19052d779c7bc0899149c6114a4e42520756dae1598e18458d94522d6c7701a7bc3a37067ac2a1616dbbf8e5ea