Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 19:55
Static task
static1
Behavioral task
behavioral1
Sample
96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
96e1b7e54ae0ce539cfe6cc55dd45642
-
SHA1
b15a8dcc868aabdf32ff462cadc921cba4afb477
-
SHA256
082c5ed7f0134b9cc7c9f9d7d8420cf25a3b709a4ebf9797c9f8637d3f5cb767
-
SHA512
cf3c461c7d8906bbc079e06c132fb08acbbba80c62ec9b35fa0a4caa5945f55906eb3cf5e20a8b5ffce1460533a058d7e8bd50988584c514ff30451d45aaf903
-
SSDEEP
24576:HCzsJS/A1jPhEeYChuUUmLoNOaj/ND9ngpyVeTW7U+oLOzcRoqV+CZEl+Q/8nV:Hwbn79U+k9RR7ElX/8V
Malware Config
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 4116 msdcsc.exe 1916 msdcsc.exe 4324 msdcsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2936 set thread context of 4128 2936 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 85 PID 4128 set thread context of 4964 4128 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 86 PID 4116 set thread context of 1916 4116 msdcsc.exe 90 PID 1916 set thread context of 4324 1916 msdcsc.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeSecurityPrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeLoadDriverPrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeSystemProfilePrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeSystemtimePrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeBackupPrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeRestorePrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeShutdownPrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeDebugPrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeUndockPrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeManageVolumePrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeImpersonatePrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: 33 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: 34 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: 35 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: 36 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 4324 msdcsc.exe Token: SeSecurityPrivilege 4324 msdcsc.exe Token: SeTakeOwnershipPrivilege 4324 msdcsc.exe Token: SeLoadDriverPrivilege 4324 msdcsc.exe Token: SeSystemProfilePrivilege 4324 msdcsc.exe Token: SeSystemtimePrivilege 4324 msdcsc.exe Token: SeProfSingleProcessPrivilege 4324 msdcsc.exe Token: SeIncBasePriorityPrivilege 4324 msdcsc.exe Token: SeCreatePagefilePrivilege 4324 msdcsc.exe Token: SeBackupPrivilege 4324 msdcsc.exe Token: SeRestorePrivilege 4324 msdcsc.exe Token: SeShutdownPrivilege 4324 msdcsc.exe Token: SeDebugPrivilege 4324 msdcsc.exe Token: SeSystemEnvironmentPrivilege 4324 msdcsc.exe Token: SeChangeNotifyPrivilege 4324 msdcsc.exe Token: SeRemoteShutdownPrivilege 4324 msdcsc.exe Token: SeUndockPrivilege 4324 msdcsc.exe Token: SeManageVolumePrivilege 4324 msdcsc.exe Token: SeImpersonatePrivilege 4324 msdcsc.exe Token: SeCreateGlobalPrivilege 4324 msdcsc.exe Token: 33 4324 msdcsc.exe Token: 34 4324 msdcsc.exe Token: 35 4324 msdcsc.exe Token: 36 4324 msdcsc.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2936 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 4128 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 4116 msdcsc.exe 1916 msdcsc.exe 4324 msdcsc.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2936 wrote to memory of 4128 2936 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 85 PID 2936 wrote to memory of 4128 2936 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 85 PID 2936 wrote to memory of 4128 2936 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 85 PID 2936 wrote to memory of 4128 2936 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 85 PID 2936 wrote to memory of 4128 2936 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 85 PID 2936 wrote to memory of 4128 2936 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 85 PID 2936 wrote to memory of 4128 2936 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 85 PID 2936 wrote to memory of 4128 2936 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 85 PID 4128 wrote to memory of 4964 4128 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 86 PID 4128 wrote to memory of 4964 4128 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 86 PID 4128 wrote to memory of 4964 4128 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 86 PID 4128 wrote to memory of 4964 4128 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 86 PID 4128 wrote to memory of 4964 4128 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 86 PID 4128 wrote to memory of 4964 4128 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 86 PID 4128 wrote to memory of 4964 4128 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 86 PID 4128 wrote to memory of 4964 4128 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 86 PID 4128 wrote to memory of 4964 4128 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 86 PID 4128 wrote to memory of 4964 4128 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 86 PID 4128 wrote to memory of 4964 4128 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 86 PID 4128 wrote to memory of 4964 4128 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 86 PID 4128 wrote to memory of 4964 4128 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 86 PID 4128 wrote to memory of 4964 4128 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 86 PID 4964 wrote to memory of 4116 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 88 PID 4964 wrote to memory of 4116 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 88 PID 4964 wrote to memory of 4116 4964 96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe 88 PID 4116 wrote to memory of 1916 4116 msdcsc.exe 90 PID 4116 wrote to memory of 1916 4116 msdcsc.exe 90 PID 4116 wrote to memory of 1916 4116 msdcsc.exe 90 PID 4116 wrote to memory of 1916 4116 msdcsc.exe 90 PID 4116 wrote to memory of 1916 4116 msdcsc.exe 90 PID 4116 wrote to memory of 1916 4116 msdcsc.exe 90 PID 4116 wrote to memory of 1916 4116 msdcsc.exe 90 PID 4116 wrote to memory of 1916 4116 msdcsc.exe 90 PID 1916 wrote to memory of 4324 1916 msdcsc.exe 91 PID 1916 wrote to memory of 4324 1916 msdcsc.exe 91 PID 1916 wrote to memory of 4324 1916 msdcsc.exe 91 PID 1916 wrote to memory of 4324 1916 msdcsc.exe 91 PID 1916 wrote to memory of 4324 1916 msdcsc.exe 91 PID 1916 wrote to memory of 4324 1916 msdcsc.exe 91 PID 1916 wrote to memory of 4324 1916 msdcsc.exe 91 PID 1916 wrote to memory of 4324 1916 msdcsc.exe 91 PID 1916 wrote to memory of 4324 1916 msdcsc.exe 91 PID 1916 wrote to memory of 4324 1916 msdcsc.exe 91 PID 1916 wrote to memory of 4324 1916 msdcsc.exe 91 PID 1916 wrote to memory of 4324 1916 msdcsc.exe 91 PID 1916 wrote to memory of 4324 1916 msdcsc.exe 91 PID 1916 wrote to memory of 4324 1916 msdcsc.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\96e1b7e54ae0ce539cfe6cc55dd45642_JaffaCakes118.exe3⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4324
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD596e1b7e54ae0ce539cfe6cc55dd45642
SHA1b15a8dcc868aabdf32ff462cadc921cba4afb477
SHA256082c5ed7f0134b9cc7c9f9d7d8420cf25a3b709a4ebf9797c9f8637d3f5cb767
SHA512cf3c461c7d8906bbc079e06c132fb08acbbba80c62ec9b35fa0a4caa5945f55906eb3cf5e20a8b5ffce1460533a058d7e8bd50988584c514ff30451d45aaf903