Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 05:06
Static task
static1
Behavioral task
behavioral1
Sample
5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118.exe
-
Size
849KB
-
MD5
5af9f8351c27c32d1c9d2179a34a0620
-
SHA1
b5046e105332a7fe6c71bd0f7d676158f30309f9
-
SHA256
e95cc70d8ce174cc2b28667e97552a26a91fcb7991d32a81fd23c9460af69af4
-
SHA512
436d353271c2e9a1282c89b84fca67d9f03891d0a4800902cd580fae071ff28aa361f2bdfd31bb207a84edc9d029a6257f8f8954f0092f033122dbd048adec62
-
SSDEEP
24576:o/QCXJSjgFOc433HWfFLj9kN+z9SprkSf2:F6Sjgp2m939kY90Lu
Malware Config
Extracted
darkcomet
Guest16
46.130.27.71:2000
DC_MUTEX-NDU3QZA
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
qghUM0qoxpi0
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
ãã.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" ãã.exe -
Executes dropped EXE 2 IoCs
Processes:
ãã.exemsdcsc.exepid Process 3028 ãã.exe 2832 msdcsc.exe -
Loads dropped DLL 4 IoCs
Processes:
5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118.exeãã.exepid Process 2056 5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118.exe 2056 5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118.exe 3028 ãã.exe 3028 ãã.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ãã.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" ãã.exe -
Processes:
resource yara_rule behavioral1/files/0x0008000000012116-3.dat upx behavioral1/memory/3028-14-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2832-31-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3028-35-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2832-36-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2832-38-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118.exeãã.exeDllHost.exemsdcsc.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ãã.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
ãã.exemsdcsc.exedescription pid Process Token: SeIncreaseQuotaPrivilege 3028 ãã.exe Token: SeSecurityPrivilege 3028 ãã.exe Token: SeTakeOwnershipPrivilege 3028 ãã.exe Token: SeLoadDriverPrivilege 3028 ãã.exe Token: SeSystemProfilePrivilege 3028 ãã.exe Token: SeSystemtimePrivilege 3028 ãã.exe Token: SeProfSingleProcessPrivilege 3028 ãã.exe Token: SeIncBasePriorityPrivilege 3028 ãã.exe Token: SeCreatePagefilePrivilege 3028 ãã.exe Token: SeBackupPrivilege 3028 ãã.exe Token: SeRestorePrivilege 3028 ãã.exe Token: SeShutdownPrivilege 3028 ãã.exe Token: SeDebugPrivilege 3028 ãã.exe Token: SeSystemEnvironmentPrivilege 3028 ãã.exe Token: SeChangeNotifyPrivilege 3028 ãã.exe Token: SeRemoteShutdownPrivilege 3028 ãã.exe Token: SeUndockPrivilege 3028 ãã.exe Token: SeManageVolumePrivilege 3028 ãã.exe Token: SeImpersonatePrivilege 3028 ãã.exe Token: SeCreateGlobalPrivilege 3028 ãã.exe Token: 33 3028 ãã.exe Token: 34 3028 ãã.exe Token: 35 3028 ãã.exe Token: SeIncreaseQuotaPrivilege 2832 msdcsc.exe Token: SeSecurityPrivilege 2832 msdcsc.exe Token: SeTakeOwnershipPrivilege 2832 msdcsc.exe Token: SeLoadDriverPrivilege 2832 msdcsc.exe Token: SeSystemProfilePrivilege 2832 msdcsc.exe Token: SeSystemtimePrivilege 2832 msdcsc.exe Token: SeProfSingleProcessPrivilege 2832 msdcsc.exe Token: SeIncBasePriorityPrivilege 2832 msdcsc.exe Token: SeCreatePagefilePrivilege 2832 msdcsc.exe Token: SeBackupPrivilege 2832 msdcsc.exe Token: SeRestorePrivilege 2832 msdcsc.exe Token: SeShutdownPrivilege 2832 msdcsc.exe Token: SeDebugPrivilege 2832 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2832 msdcsc.exe Token: SeChangeNotifyPrivilege 2832 msdcsc.exe Token: SeRemoteShutdownPrivilege 2832 msdcsc.exe Token: SeUndockPrivilege 2832 msdcsc.exe Token: SeManageVolumePrivilege 2832 msdcsc.exe Token: SeImpersonatePrivilege 2832 msdcsc.exe Token: SeCreateGlobalPrivilege 2832 msdcsc.exe Token: 33 2832 msdcsc.exe Token: 34 2832 msdcsc.exe Token: 35 2832 msdcsc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid Process 2392 DllHost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
msdcsc.exeDllHost.exepid Process 2832 msdcsc.exe 2392 DllHost.exe 2392 DllHost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118.exeãã.exedescription pid Process procid_target PID 2056 wrote to memory of 3028 2056 5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118.exe 30 PID 2056 wrote to memory of 3028 2056 5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118.exe 30 PID 2056 wrote to memory of 3028 2056 5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118.exe 30 PID 2056 wrote to memory of 3028 2056 5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2832 3028 ãã.exe 32 PID 3028 wrote to memory of 2832 3028 ãã.exe 32 PID 3028 wrote to memory of 2832 3028 ãã.exe 32 PID 3028 wrote to memory of 2832 3028 ãã.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5af9f8351c27c32d1c9d2179a34a0620_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\ãã.exe"C:\Users\Admin\AppData\Local\Temp\ãã.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2392
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
607KB
MD59112df1b4e0eb539ac980cb4e21b29a8
SHA1c44136037303b0e8d28f59e2657f308241ca6c9c
SHA2562f3991ac90c2b4dd9718db100dda1fcfb203cd2e5fd67665b91059b8c25bc022
SHA512e5438e1a71be657e76418be68e3b4a78ad8fac71485fc8c72812c21bc9bf2b109ad7fdbcf534f824aa24e952dfe6cef677b632c9db7d49eb23cb8274dbba097e
-
Filesize
251KB
MD5b0ee29daad196846092c646453938d80
SHA1c72fd553d44745b81a285be1d46214f11610d89d
SHA256b78166222dfa01f6583443162cc1d4780347943297ccf30eb114ba61119f2765
SHA512582ba8bf7817ebef597e9520183adb28946388a54e494769016a0ad0108a4391f0f111dcb0f5d8e64fa7a351e698a8fe888eb84da4ac1e8de6fd33136b2bd980