Analysis
-
max time kernel
149s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
dc1c009149df32f04373b3519dfdbc8b_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
dc1c009149df32f04373b3519dfdbc8b_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
dc1c009149df32f04373b3519dfdbc8b
-
SHA1
aef5fd7a3cd4351d96c53f4bece6a0cdf7835029
-
SHA256
619ccf5b3f6fe85d1887645e84ff4d480c7f53a0903a00fee2b6a4a3cd46a458
-
SHA512
1ec3919720658c495ead64f44f1eda2f666216f664cbad60890be18746b1426b242691d726ee51de6b48142e61945d148c21334453b23646ead33b2a482828d0
-
SSDEEP
12288:DaWzgMg7v3qnCiMErQohh0F4CCJ8lnyC8idoH8DVqlXueHrvNI8qNHiUXdWTJAAT:maHMv6CorjqnyC8klDuHbNInHRC2WhZ
Malware Config
Extracted
darkcomet
Guest16
darktestsh123.no-ip.info:1604
DC_MUTEX-XCY52F9
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
7U95T83DNYtl
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" uncrypted.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" msdcsc.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msdcsc.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 2924 uncrypted.exe 2984 msdcsc.exe -
Loads dropped DLL 7 IoCs
pid Process 848 dc1c009149df32f04373b3519dfdbc8b_JaffaCakes118.exe 848 dc1c009149df32f04373b3519dfdbc8b_JaffaCakes118.exe 848 dc1c009149df32f04373b3519dfdbc8b_JaffaCakes118.exe 848 dc1c009149df32f04373b3519dfdbc8b_JaffaCakes118.exe 848 dc1c009149df32f04373b3519dfdbc8b_JaffaCakes118.exe 2924 uncrypted.exe 2924 uncrypted.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" uncrypted.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" msdcsc.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/848-0-0x0000000000400000-0x00000000004D5000-memory.dmp autoit_exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe uncrypted.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe uncrypted.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ uncrypted.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc1c009149df32f04373b3519dfdbc8b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uncrypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2924 uncrypted.exe Token: SeSecurityPrivilege 2924 uncrypted.exe Token: SeTakeOwnershipPrivilege 2924 uncrypted.exe Token: SeLoadDriverPrivilege 2924 uncrypted.exe Token: SeSystemProfilePrivilege 2924 uncrypted.exe Token: SeSystemtimePrivilege 2924 uncrypted.exe Token: SeProfSingleProcessPrivilege 2924 uncrypted.exe Token: SeIncBasePriorityPrivilege 2924 uncrypted.exe Token: SeCreatePagefilePrivilege 2924 uncrypted.exe Token: SeBackupPrivilege 2924 uncrypted.exe Token: SeRestorePrivilege 2924 uncrypted.exe Token: SeShutdownPrivilege 2924 uncrypted.exe Token: SeDebugPrivilege 2924 uncrypted.exe Token: SeSystemEnvironmentPrivilege 2924 uncrypted.exe Token: SeChangeNotifyPrivilege 2924 uncrypted.exe Token: SeRemoteShutdownPrivilege 2924 uncrypted.exe Token: SeUndockPrivilege 2924 uncrypted.exe Token: SeManageVolumePrivilege 2924 uncrypted.exe Token: SeImpersonatePrivilege 2924 uncrypted.exe Token: SeCreateGlobalPrivilege 2924 uncrypted.exe Token: 33 2924 uncrypted.exe Token: 34 2924 uncrypted.exe Token: 35 2924 uncrypted.exe Token: SeIncreaseQuotaPrivilege 2984 msdcsc.exe Token: SeSecurityPrivilege 2984 msdcsc.exe Token: SeTakeOwnershipPrivilege 2984 msdcsc.exe Token: SeLoadDriverPrivilege 2984 msdcsc.exe Token: SeSystemProfilePrivilege 2984 msdcsc.exe Token: SeSystemtimePrivilege 2984 msdcsc.exe Token: SeProfSingleProcessPrivilege 2984 msdcsc.exe Token: SeIncBasePriorityPrivilege 2984 msdcsc.exe Token: SeCreatePagefilePrivilege 2984 msdcsc.exe Token: SeBackupPrivilege 2984 msdcsc.exe Token: SeRestorePrivilege 2984 msdcsc.exe Token: SeShutdownPrivilege 2984 msdcsc.exe Token: SeDebugPrivilege 2984 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2984 msdcsc.exe Token: SeChangeNotifyPrivilege 2984 msdcsc.exe Token: SeRemoteShutdownPrivilege 2984 msdcsc.exe Token: SeUndockPrivilege 2984 msdcsc.exe Token: SeManageVolumePrivilege 2984 msdcsc.exe Token: SeImpersonatePrivilege 2984 msdcsc.exe Token: SeCreateGlobalPrivilege 2984 msdcsc.exe Token: 33 2984 msdcsc.exe Token: 34 2984 msdcsc.exe Token: 35 2984 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2984 msdcsc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 848 wrote to memory of 2924 848 dc1c009149df32f04373b3519dfdbc8b_JaffaCakes118.exe 28 PID 848 wrote to memory of 2924 848 dc1c009149df32f04373b3519dfdbc8b_JaffaCakes118.exe 28 PID 848 wrote to memory of 2924 848 dc1c009149df32f04373b3519dfdbc8b_JaffaCakes118.exe 28 PID 848 wrote to memory of 2924 848 dc1c009149df32f04373b3519dfdbc8b_JaffaCakes118.exe 28 PID 2924 wrote to memory of 2984 2924 uncrypted.exe 29 PID 2924 wrote to memory of 2984 2924 uncrypted.exe 29 PID 2924 wrote to memory of 2984 2924 uncrypted.exe 29 PID 2924 wrote to memory of 2984 2924 uncrypted.exe 29 PID 2984 wrote to memory of 2712 2984 msdcsc.exe 30 PID 2984 wrote to memory of 2712 2984 msdcsc.exe 30 PID 2984 wrote to memory of 2712 2984 msdcsc.exe 30 PID 2984 wrote to memory of 2712 2984 msdcsc.exe 30 PID 2984 wrote to memory of 2728 2984 msdcsc.exe 31 PID 2984 wrote to memory of 2728 2984 msdcsc.exe 31 PID 2984 wrote to memory of 2728 2984 msdcsc.exe 31 PID 2984 wrote to memory of 2728 2984 msdcsc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc1c009149df32f04373b3519dfdbc8b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc1c009149df32f04373b3519dfdbc8b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\uncrypted.exe"C:\Users\Admin\AppData\Local\Temp\uncrypted.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵PID:2712
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵PID:2728
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD59b826fe60458bdfe801f3807d2f4219f
SHA1b490ede17dd208a9f41fe767d61f7656060f5508
SHA256e59fa9838cdde40d5845d0ac89e5bdb51ad3b3c74d9c27d5fbc8fa14d57384ff
SHA51207d80533c7b588a2861aa7f77d87d78b488c9bb73837b0c36e1f25caad3bac0a51c1e29bd7ebbf5ba5b11989fb410a4c0a7c15845f358f116ff68083a932f32a
-
Filesize
332KB
MD5f5b507d793a1f07b1735f57118943ec0
SHA127cba0b7895c3e8a1f22fa4954b526885e47e205
SHA25649ed71b6c346046d05b4a636539118456e3a07f2beaa645d418ffe71db590a23
SHA512e2d1e881a9f4fd4a1092ff75646de3c1c87bdfb2f75a2e0246f058d855dcedf378018b2e1535e523841f594209de73a98bfb7a1ff74d4b696e9a0db0ebc10672