Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 21:20
Static task
static1
Behavioral task
behavioral1
Sample
d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
d3aa661e379ab45d42e977fe6440320d
-
SHA1
d3033071d5e7e099eb1292ac1c29a1ccf9ddc29d
-
SHA256
596742e436c3a63ade42e1f91bb00364a21a3ed3f742122dbe0368280e8f02e9
-
SHA512
2bb2a2678dfd01b47c9617f9d72e9eba589fbebdc074019e0e8776f6575441ca2971252df447648f2c423a0630c49a19a4852e430288e20e763f12cf97ae83a1
-
SSDEEP
24576:n+t551zGlKYkNmyASIHZmHmHMcbG3tbxp1aL9g:n+t55dGimyASIoHmsfbxpE
Malware Config
Extracted
darkcomet
Guest16
68.194.136.134:1604
DC_MUTEX-G293ZDW
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
qG1EhGAmh8HK
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" WinSec.exe -
Executes dropped EXE 3 IoCs
pid Process 2576 WinSec.exe 2752 msdcsc.exe 2872 WinSec.exe -
Loads dropped DLL 3 IoCs
pid Process 3032 d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe 2576 WinSec.exe 2576 WinSec.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" WinSec.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3032 set thread context of 2576 3032 d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe 30 PID 2752 set thread context of 2872 2752 msdcsc.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinSec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2576 WinSec.exe Token: SeSecurityPrivilege 2576 WinSec.exe Token: SeTakeOwnershipPrivilege 2576 WinSec.exe Token: SeLoadDriverPrivilege 2576 WinSec.exe Token: SeSystemProfilePrivilege 2576 WinSec.exe Token: SeSystemtimePrivilege 2576 WinSec.exe Token: SeProfSingleProcessPrivilege 2576 WinSec.exe Token: SeIncBasePriorityPrivilege 2576 WinSec.exe Token: SeCreatePagefilePrivilege 2576 WinSec.exe Token: SeBackupPrivilege 2576 WinSec.exe Token: SeRestorePrivilege 2576 WinSec.exe Token: SeShutdownPrivilege 2576 WinSec.exe Token: SeDebugPrivilege 2576 WinSec.exe Token: SeSystemEnvironmentPrivilege 2576 WinSec.exe Token: SeChangeNotifyPrivilege 2576 WinSec.exe Token: SeRemoteShutdownPrivilege 2576 WinSec.exe Token: SeUndockPrivilege 2576 WinSec.exe Token: SeManageVolumePrivilege 2576 WinSec.exe Token: SeImpersonatePrivilege 2576 WinSec.exe Token: SeCreateGlobalPrivilege 2576 WinSec.exe Token: 33 2576 WinSec.exe Token: 34 2576 WinSec.exe Token: 35 2576 WinSec.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2576 3032 d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2576 3032 d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2576 3032 d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2576 3032 d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2576 3032 d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2576 3032 d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2576 3032 d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2576 3032 d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2576 3032 d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2576 3032 d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2576 3032 d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2576 3032 d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2576 3032 d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2576 3032 d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe 30 PID 3032 wrote to memory of 2576 3032 d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe 30 PID 2576 wrote to memory of 2752 2576 WinSec.exe 31 PID 2576 wrote to memory of 2752 2576 WinSec.exe 31 PID 2576 wrote to memory of 2752 2576 WinSec.exe 31 PID 2576 wrote to memory of 2752 2576 WinSec.exe 31 PID 2752 wrote to memory of 2872 2752 msdcsc.exe 32 PID 2752 wrote to memory of 2872 2752 msdcsc.exe 32 PID 2752 wrote to memory of 2872 2752 msdcsc.exe 32 PID 2752 wrote to memory of 2872 2752 msdcsc.exe 32 PID 2752 wrote to memory of 2872 2752 msdcsc.exe 32 PID 2752 wrote to memory of 2872 2752 msdcsc.exe 32 PID 2752 wrote to memory of 2872 2752 msdcsc.exe 32 PID 2752 wrote to memory of 2872 2752 msdcsc.exe 32 PID 2752 wrote to memory of 2872 2752 msdcsc.exe 32 PID 2752 wrote to memory of 2872 2752 msdcsc.exe 32 PID 2752 wrote to memory of 2872 2752 msdcsc.exe 32 PID 2752 wrote to memory of 2872 2752 msdcsc.exe 32 PID 2752 wrote to memory of 2872 2752 msdcsc.exe 32 PID 2752 wrote to memory of 2872 2752 msdcsc.exe 32 PID 2752 wrote to memory of 2872 2752 msdcsc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3aa661e379ab45d42e977fe6440320d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Roaming\WinSec.exeC:\Users\Admin\AppData\Roaming\WinSec.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Roaming\WinSec.exeC:\Users\Admin\AppData\Roaming\WinSec.exe4⤵
- Executes dropped EXE
PID:2872
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
Filesize
1.0MB
MD5d3aa661e379ab45d42e977fe6440320d
SHA1d3033071d5e7e099eb1292ac1c29a1ccf9ddc29d
SHA256596742e436c3a63ade42e1f91bb00364a21a3ed3f742122dbe0368280e8f02e9
SHA5122bb2a2678dfd01b47c9617f9d72e9eba589fbebdc074019e0e8776f6575441ca2971252df447648f2c423a0630c49a19a4852e430288e20e763f12cf97ae83a1