Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-12-2024 11:02

General

  • Target

    d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe

  • Size

    2.6MB

  • MD5

    d6b63143f76d9661a29075bdb205db9c

  • SHA1

    ade973a99a0fd7af906a7ee9c1262e26ce8a0570

  • SHA256

    7c6d4716d6d2274220e6424c2a7db27abda4f800276daea601364deda8c2382b

  • SHA512

    1e647a3510b6d2bf2ff351bf4bbe3a6735de5f3f2a2ce72e66706b057789e4ac279ffe0276db2148b1ed36e381d32065129c2738ad5a8c1dba140e75a926c38a

  • SSDEEP

    49152:us9anL1IVFg88eMQR0wJDJKe9GiEl/H876hFXw4wC4QfJjPpcBjYr2Ox:uYY1R8eQHJDJKejElU7EFXwzC4QdOjYN

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 6 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 7 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d6b63143f76d9661a29075bdb205db9c_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\IsINHJJBAG.bat"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2372
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2148
      • C:\Windows\SysWOW64\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          4⤵
            PID:1408
        • C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\explorer.exe
          "C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\explorer.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1516
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Documents and Settings\audiodg.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1744
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\explorer.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2596
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\DevicePairingWizard\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2604
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\InkEd\dwm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:1616
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsm.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2656
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\OSPPSVC.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:3004

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\lsm.exe

      Filesize

      2.6MB

      MD5

      d6b63143f76d9661a29075bdb205db9c

      SHA1

      ade973a99a0fd7af906a7ee9c1262e26ce8a0570

      SHA256

      7c6d4716d6d2274220e6424c2a7db27abda4f800276daea601364deda8c2382b

      SHA512

      1e647a3510b6d2bf2ff351bf4bbe3a6735de5f3f2a2ce72e66706b057789e4ac279ffe0276db2148b1ed36e381d32065129c2738ad5a8c1dba140e75a926c38a

    • C:\Users\Admin\AppData\Local\Temp\IsINHJJBAG.bat

      Filesize

      251B

      MD5

      690d9f0763edc2e31996cf02df30ef3b

      SHA1

      5811b99fb72723e1c41af114f9ab1eea0418887a

      SHA256

      e61bc8abed7811b9a50f5f122bb9f5c06e47b211429d6eda6d7dc98441850871

      SHA512

      8368167853202c163850cb91fc85ecdfcb6341fb37bbef539903dea9ba4fc2c224d044e23d188b4133b0f16909cc2fa7730384d1556e6b4752da12a8bc267c87

    • memory/1516-27-0x00000000002B0000-0x000000000086E000-memory.dmp

      Filesize

      5.7MB

    • memory/1516-28-0x00000000002B0000-0x000000000086E000-memory.dmp

      Filesize

      5.7MB

    • memory/1516-29-0x00000000002B0000-0x000000000086E000-memory.dmp

      Filesize

      5.7MB

    • memory/1516-30-0x0000000002480000-0x0000000002488000-memory.dmp

      Filesize

      32KB

    • memory/1516-32-0x00000000002B0000-0x000000000086E000-memory.dmp

      Filesize

      5.7MB

    • memory/2188-0-0x0000000000C10000-0x00000000011CE000-memory.dmp

      Filesize

      5.7MB

    • memory/2188-1-0x0000000000C10000-0x00000000011CE000-memory.dmp

      Filesize

      5.7MB

    • memory/2188-2-0x0000000000C10000-0x00000000011CE000-memory.dmp

      Filesize

      5.7MB

    • memory/2188-21-0x0000000000C10000-0x00000000011CE000-memory.dmp

      Filesize

      5.7MB

    • memory/2372-25-0x00000000023D0000-0x000000000298E000-memory.dmp

      Filesize

      5.7MB