Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 11:02
Static task
static1
Behavioral task
behavioral1
Sample
d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe
-
Size
2.6MB
-
MD5
d6b63143f76d9661a29075bdb205db9c
-
SHA1
ade973a99a0fd7af906a7ee9c1262e26ce8a0570
-
SHA256
7c6d4716d6d2274220e6424c2a7db27abda4f800276daea601364deda8c2382b
-
SHA512
1e647a3510b6d2bf2ff351bf4bbe3a6735de5f3f2a2ce72e66706b057789e4ac279ffe0276db2148b1ed36e381d32065129c2738ad5a8c1dba140e75a926c38a
-
SSDEEP
49152:us9anL1IVFg88eMQR0wJDJKe9GiEl/H876hFXw4wC4QfJjPpcBjYr2Ox:uYY1R8eQHJDJKejElU7EFXwzC4QdOjYN
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1744 2116 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2596 2116 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 2116 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1616 2116 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2656 2116 schtasks.exe 30 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3004 2116 schtasks.exe 30 -
resource yara_rule behavioral1/memory/2188-1-0x0000000000C10000-0x00000000011CE000-memory.dmp dcrat behavioral1/memory/2188-2-0x0000000000C10000-0x00000000011CE000-memory.dmp dcrat behavioral1/memory/2188-21-0x0000000000C10000-0x00000000011CE000-memory.dmp dcrat behavioral1/memory/1516-27-0x00000000002B0000-0x000000000086E000-memory.dmp dcrat behavioral1/memory/1516-28-0x00000000002B0000-0x000000000086E000-memory.dmp dcrat behavioral1/memory/1516-29-0x00000000002B0000-0x000000000086E000-memory.dmp dcrat behavioral1/memory/1516-32-0x00000000002B0000-0x000000000086E000-memory.dmp dcrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorer.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 1516 explorer.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine explorer.exe -
Loads dropped DLL 2 IoCs
pid Process 2372 cmd.exe 2372 cmd.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Program Files (x86)\\Microsoft SQL Server Compact Edition\\v3.5\\Desktop\\lsm.exe\"" d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\OSPPSVC.exe\"" d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Documents and Settings\\audiodg.exe\"" d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\explorer.exe\"" d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\System32\\DevicePairingWizard\\lsm.exe\"" d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\InkEd\\dwm.exe\"" d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\DevicePairingWizard\lsm.exe d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe File created C:\Windows\SysWOW64\DevicePairingWizard\101b941d020240259ca4912829b53995ad543df6 d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe File created C:\Windows\SysWOW64\InkEd\dwm.exe d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe File created C:\Windows\SysWOW64\InkEd\6cb0b6c459d5d3455a3da700e713f2e2529862ff d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2188 d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe 1516 explorer.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsm.exe d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\101b941d020240259ca4912829b53995ad543df6 d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w32tm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2596 schtasks.exe 2604 schtasks.exe 1616 schtasks.exe 2656 schtasks.exe 3004 schtasks.exe 1744 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2188 d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe 2188 d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe 1516 explorer.exe 1516 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2188 d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe Token: SeDebugPrivilege 1516 explorer.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2372 2188 d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe 37 PID 2188 wrote to memory of 2372 2188 d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe 37 PID 2188 wrote to memory of 2372 2188 d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe 37 PID 2188 wrote to memory of 2372 2188 d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe 37 PID 2372 wrote to memory of 2148 2372 cmd.exe 39 PID 2372 wrote to memory of 2148 2372 cmd.exe 39 PID 2372 wrote to memory of 2148 2372 cmd.exe 39 PID 2372 wrote to memory of 2148 2372 cmd.exe 39 PID 2372 wrote to memory of 2788 2372 cmd.exe 40 PID 2372 wrote to memory of 2788 2372 cmd.exe 40 PID 2372 wrote to memory of 2788 2372 cmd.exe 40 PID 2372 wrote to memory of 2788 2372 cmd.exe 40 PID 2788 wrote to memory of 1408 2788 w32tm.exe 41 PID 2788 wrote to memory of 1408 2788 w32tm.exe 41 PID 2788 wrote to memory of 1408 2788 w32tm.exe 41 PID 2788 wrote to memory of 1408 2788 w32tm.exe 41 PID 2372 wrote to memory of 1516 2372 cmd.exe 42 PID 2372 wrote to memory of 1516 2372 cmd.exe 42 PID 2372 wrote to memory of 1516 2372 cmd.exe 42 PID 2372 wrote to memory of 1516 2372 cmd.exe 42 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\IsINHJJBAG.bat"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵PID:1408
-
-
-
C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\explorer.exe"C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\explorer.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Documents and Settings\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\DevicePairingWizard\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2604
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\InkEd\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2656
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3004
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5d6b63143f76d9661a29075bdb205db9c
SHA1ade973a99a0fd7af906a7ee9c1262e26ce8a0570
SHA2567c6d4716d6d2274220e6424c2a7db27abda4f800276daea601364deda8c2382b
SHA5121e647a3510b6d2bf2ff351bf4bbe3a6735de5f3f2a2ce72e66706b057789e4ac279ffe0276db2148b1ed36e381d32065129c2738ad5a8c1dba140e75a926c38a
-
Filesize
251B
MD5690d9f0763edc2e31996cf02df30ef3b
SHA15811b99fb72723e1c41af114f9ab1eea0418887a
SHA256e61bc8abed7811b9a50f5f122bb9f5c06e47b211429d6eda6d7dc98441850871
SHA5128368167853202c163850cb91fc85ecdfcb6341fb37bbef539903dea9ba4fc2c224d044e23d188b4133b0f16909cc2fa7730384d1556e6b4752da12a8bc267c87