Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 02:16
Static task
static1
Behavioral task
behavioral1
Sample
d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe
-
Size
596KB
-
MD5
d030e69d60fbc0819bbdaacc66a902bf
-
SHA1
77cb5716f9f5ccc26d172ec8f721e8e482d0dd37
-
SHA256
b67273426b187212e1b5eedb340c8a34d7b6f43339f2cfe8036b7b903edad9d5
-
SHA512
4f5ac3a31448ac1f580bc36fd8171cc178e68fa7460db9a5e41562ec634c28a7514be47d8e623c5547343771605a49bf58198a3f99f16489d57ded2ed32ea6da
-
SSDEEP
12288:OVZPjJA6ZkA+Ah8x/mYMIDWWwveLurnCWtoDH6An+fxBIjnq:OVBJFZkAT8xuY36W8nCyffAjn
Malware Config
Extracted
darkcomet
Guest16_min
nikospap.zapto.org:3206
DCMIN_MUTEX-USMAYRA
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
dQyDfVnpjzSY
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
Cleaner
Signatures
-
Darkcomet family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\DCSCMIN\\IMDCSC.exe" vbc.exe -
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/files/0x000b000000023b7a-15.dat modiloader_stage2 behavioral2/memory/3080-32-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3080 Build.exe 2072 IMDCSC.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cleaner = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\DCSCMIN\\IMDCSC.exe" vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win Update = "C:\\Users\\Admin\\AppData\\Roaming\\Win Update.exe" d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4296 set thread context of 1180 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMDCSC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1180 vbc.exe Token: SeSecurityPrivilege 1180 vbc.exe Token: SeTakeOwnershipPrivilege 1180 vbc.exe Token: SeLoadDriverPrivilege 1180 vbc.exe Token: SeSystemProfilePrivilege 1180 vbc.exe Token: SeSystemtimePrivilege 1180 vbc.exe Token: SeProfSingleProcessPrivilege 1180 vbc.exe Token: SeIncBasePriorityPrivilege 1180 vbc.exe Token: SeCreatePagefilePrivilege 1180 vbc.exe Token: SeBackupPrivilege 1180 vbc.exe Token: SeRestorePrivilege 1180 vbc.exe Token: SeShutdownPrivilege 1180 vbc.exe Token: SeDebugPrivilege 1180 vbc.exe Token: SeSystemEnvironmentPrivilege 1180 vbc.exe Token: SeChangeNotifyPrivilege 1180 vbc.exe Token: SeRemoteShutdownPrivilege 1180 vbc.exe Token: SeUndockPrivilege 1180 vbc.exe Token: SeManageVolumePrivilege 1180 vbc.exe Token: SeImpersonatePrivilege 1180 vbc.exe Token: SeCreateGlobalPrivilege 1180 vbc.exe Token: 33 1180 vbc.exe Token: 34 1180 vbc.exe Token: 35 1180 vbc.exe Token: 36 1180 vbc.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4296 wrote to memory of 1180 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 83 PID 4296 wrote to memory of 1180 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 83 PID 4296 wrote to memory of 1180 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 83 PID 4296 wrote to memory of 1180 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 83 PID 4296 wrote to memory of 1180 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 83 PID 4296 wrote to memory of 1180 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 83 PID 4296 wrote to memory of 1180 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 83 PID 4296 wrote to memory of 1180 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 83 PID 4296 wrote to memory of 1180 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 83 PID 4296 wrote to memory of 1180 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 83 PID 4296 wrote to memory of 1180 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 83 PID 4296 wrote to memory of 1180 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 83 PID 4296 wrote to memory of 1180 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 83 PID 4296 wrote to memory of 1180 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 83 PID 4296 wrote to memory of 3080 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 85 PID 4296 wrote to memory of 3080 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 85 PID 4296 wrote to memory of 3080 4296 d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe 85 PID 1180 wrote to memory of 2072 1180 vbc.exe 84 PID 1180 wrote to memory of 2072 1180 vbc.exe 84 PID 1180 wrote to memory of 2072 1180 vbc.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d030e69d60fbc0819bbdaacc66a902bf_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\ProgramData\Microsoft\Windows\Start Menu\DCSCMIN\IMDCSC.exe"C:\ProgramData\Microsoft\Windows\Start Menu\DCSCMIN\IMDCSC.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Build.exe"C:\Users\Admin\AppData\Local\Temp\Build.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3080
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
36KB
MD52bf16d68abc0cf9d18fb973621816b21
SHA18555e7452a780070e4e4ea5a7ca4801764996dc2
SHA2560d088c8fe635cbd2afb1e3b414980f200add83a9bb9272883307f324b467a8c4
SHA512a9b112202bca9f37fff0e7108d273de2ce4025d27a6bbc2a66c59d7590a63f648a61c645e5ba53308eb6203e8752e8525e7839f3200270d65cd801f71710c1d2