Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 08:46
Static task
static1
Behavioral task
behavioral1
Sample
d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
d19220e738ca3bae030183e83544aebc
-
SHA1
8f6b9a18e180ec012be9d12ddf8c2ab79e1fe990
-
SHA256
6956fe608e1cbcac4888a11b3a9815451289a38bb3fdb82c29f8f8ad593b209d
-
SHA512
c493831b0baf1f5d96921ec21ddef85b0e9e45e6ef7ebb5f82fc8da081d3fa6ee6d9fd3efec47be603ff3ae474f9fdabbff1ae530155e715eab588c09f46e980
-
SSDEEP
49152:PWkv2p8AKHzTc8b6ZgeZ50xGktV/Cg1beUU++JKpqmPfgwvc+XXgGALr28:n2pJ2zIjZg0NkLqk+XSfdvzXXGG8
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 8 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4796 4280 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2196 4280 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3256 4280 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3808 4280 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2324 4280 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4564 4280 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3988 4280 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 540 4280 schtasks.exe 84 -
resource yara_rule behavioral2/memory/4672-1-0x0000000000E80000-0x0000000001406000-memory.dmp dcrat behavioral2/memory/4672-2-0x0000000000E80000-0x0000000001406000-memory.dmp dcrat behavioral2/memory/4672-29-0x0000000000E80000-0x0000000001406000-memory.dmp dcrat behavioral2/memory/4568-33-0x00000000009F0000-0x0000000000F76000-memory.dmp dcrat behavioral2/memory/4568-34-0x00000000009F0000-0x0000000000F76000-memory.dmp dcrat behavioral2/memory/4568-35-0x00000000009F0000-0x0000000000F76000-memory.dmp dcrat behavioral2/memory/4568-40-0x00000000009F0000-0x0000000000F76000-memory.dmp dcrat behavioral2/memory/4568-48-0x00000000009F0000-0x0000000000F76000-memory.dmp dcrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sysmon.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sysmon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sysmon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4568 sysmon.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine sysmon.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Windows\\security\\EDP\\Logs\\sysmon.exe\"" d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Windows\\System32\\f3ahvoas\\SppExtComObj.exe\"" d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\Windows.Storage.Search\\dllhost.exe\"" d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Recovery\\WindowsRE\\Registry.exe\"" d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Documents and Settings\\RuntimeBroker.exe\"" d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\qcap\\RuntimeBroker.exe\"" d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\mf\\RuntimeBroker.exe\"" d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\d3d10core\\RuntimeBroker.exe\"" d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\SysWOW64\qcap\RuntimeBroker.exe d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe File created C:\Windows\SysWOW64\qcap\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe File created C:\Windows\SysWOW64\f3ahvoas\SppExtComObj.exe d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe File created C:\Windows\SysWOW64\f3ahvoas\e1ef82546f0b02b7e974f28047f3788b1128cce1 d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe File created C:\Windows\SysWOW64\Windows.Storage.Search\5940a34987c99120d96dace90a3f93f329dcad63 d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\qcap\RuntimeBroker.exe d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe File created C:\Windows\SysWOW64\mf\RuntimeBroker.exe d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe File created C:\Windows\SysWOW64\mf\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe File created C:\Windows\SysWOW64\d3d10core\RuntimeBroker.exe d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe File created C:\Windows\SysWOW64\d3d10core\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe File created C:\Windows\SysWOW64\Windows.Storage.Search\dllhost.exe d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4672 d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe 4568 sysmon.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\security\EDP\Logs\sysmon.exe d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe File created C:\Windows\security\EDP\Logs\121e5b5079f7c0e46d90f99b3864022518bbbda9 d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w32tm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3988 schtasks.exe 540 schtasks.exe 4796 schtasks.exe 2196 schtasks.exe 3256 schtasks.exe 3808 schtasks.exe 2324 schtasks.exe 4564 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4672 d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe 4672 d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe 4672 d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe 4568 sysmon.exe 4568 sysmon.exe 4568 sysmon.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4672 d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe Token: SeDebugPrivilege 4568 sysmon.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4672 wrote to memory of 684 4672 d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe 93 PID 4672 wrote to memory of 684 4672 d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe 93 PID 4672 wrote to memory of 684 4672 d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe 93 PID 684 wrote to memory of 4256 684 cmd.exe 95 PID 684 wrote to memory of 4256 684 cmd.exe 95 PID 684 wrote to memory of 4256 684 cmd.exe 95 PID 684 wrote to memory of 2564 684 cmd.exe 96 PID 684 wrote to memory of 2564 684 cmd.exe 96 PID 684 wrote to memory of 2564 684 cmd.exe 96 PID 2564 wrote to memory of 3000 2564 w32tm.exe 97 PID 2564 wrote to memory of 3000 2564 w32tm.exe 97 PID 684 wrote to memory of 4568 684 cmd.exe 99 PID 684 wrote to memory of 4568 684 cmd.exe 99 PID 684 wrote to memory of 4568 684 cmd.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d19220e738ca3bae030183e83544aebc_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\oGFhIBVZSj.bat"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
- System Location Discovery: System Language Discovery
PID:4256
-
-
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵PID:3000
-
-
-
C:\Windows\security\EDP\Logs\sysmon.exe"C:\Windows\security\EDP\Logs\sysmon.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\qcap\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\mf\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2196
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\d3d10core\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3256
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\security\EDP\Logs\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\System32\f3ahvoas\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2324
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\Windows.Storage.Search\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4564
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Documents and Settings\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:540
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215B
MD5c0d81d3dfa4f51e5cb001c3477b94c97
SHA16fde156843a17de6b82ded00db42943032da1415
SHA2565484dade8c8a754ea26dd882f22776ed0e99f1c3a62a4ba66e0854a9e9c5a767
SHA512103446277c558f9a9aac9a2b9e133453fd546b047e9e3619f45f63bc01666add2567d31ce2e2fa5825ecadbe45cf8ca28eb73d805bbac97cf8acb538f579144e
-
Filesize
2.3MB
MD5d19220e738ca3bae030183e83544aebc
SHA18f6b9a18e180ec012be9d12ddf8c2ab79e1fe990
SHA2566956fe608e1cbcac4888a11b3a9815451289a38bb3fdb82c29f8f8ad593b209d
SHA512c493831b0baf1f5d96921ec21ddef85b0e9e45e6ef7ebb5f82fc8da081d3fa6ee6d9fd3efec47be603ff3ae474f9fdabbff1ae530155e715eab588c09f46e980