Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 13:25
Static task
static1
Behavioral task
behavioral1
Sample
e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
e1aaadeea3b6a7eb266464759e3015e0
-
SHA1
b8598cc86990f8037a337d37d815bf6bc2731a4f
-
SHA256
a56b7626f51392efde61f7badbde40701275e457ee210b22aab17592b9c009a9
-
SHA512
8b86674e6d410ea4d0dd5e76b584388dcc8aa12880f11e964c18019b289bd651dfe056464448be6d0a90090fdbf39cb32ff9a11f94fb9fd62e9637eb0409c1fb
-
SSDEEP
12288:BPr07ZEcWwpOYrEAw5bq4RGLeEF7EDG2O2fra7RSRUL7uHDIbntFuisEi6v3DyNq:BjQcbUADuU8iWr9itzwZTEqjQ0EBbtG
Malware Config
Extracted
darkcomet
Victim
loldude12345.zapto.org:1604
DC_MUTEX-WYV5PKM
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
oiVpUYYaVk85
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2808 msdcsc.exe -
Loads dropped DLL 1 IoCs
pid Process 2612 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" svchost.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe svchost.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe svchost.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1712 set thread context of 2612 1712 e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2612 svchost.exe Token: SeSecurityPrivilege 2612 svchost.exe Token: SeTakeOwnershipPrivilege 2612 svchost.exe Token: SeLoadDriverPrivilege 2612 svchost.exe Token: SeSystemProfilePrivilege 2612 svchost.exe Token: SeSystemtimePrivilege 2612 svchost.exe Token: SeProfSingleProcessPrivilege 2612 svchost.exe Token: SeIncBasePriorityPrivilege 2612 svchost.exe Token: SeCreatePagefilePrivilege 2612 svchost.exe Token: SeBackupPrivilege 2612 svchost.exe Token: SeRestorePrivilege 2612 svchost.exe Token: SeShutdownPrivilege 2612 svchost.exe Token: SeDebugPrivilege 2612 svchost.exe Token: SeSystemEnvironmentPrivilege 2612 svchost.exe Token: SeChangeNotifyPrivilege 2612 svchost.exe Token: SeRemoteShutdownPrivilege 2612 svchost.exe Token: SeUndockPrivilege 2612 svchost.exe Token: SeManageVolumePrivilege 2612 svchost.exe Token: SeImpersonatePrivilege 2612 svchost.exe Token: SeCreateGlobalPrivilege 2612 svchost.exe Token: 33 2612 svchost.exe Token: 34 2612 svchost.exe Token: 35 2612 svchost.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2612 1712 e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2612 1712 e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2612 1712 e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2612 1712 e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2612 1712 e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2612 1712 e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2612 1712 e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2612 1712 e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2612 1712 e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2612 1712 e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2612 1712 e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2612 1712 e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe 30 PID 1712 wrote to memory of 2612 1712 e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe 30 PID 2612 wrote to memory of 2808 2612 svchost.exe 31 PID 2612 wrote to memory of 2808 2612 svchost.exe 31 PID 2612 wrote to memory of 2808 2612 svchost.exe 31 PID 2612 wrote to memory of 2808 2612 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1aaadeea3b6a7eb266464759e3015e0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD554a47f6b5e09a77e61649109c6a08866
SHA14af001b3c3816b860660cf2de2c0fd3c1dfb4878
SHA256121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2
SHA51288ee0ef5af1b0b38c19ab4c307636352fc403ea74f3bfb17e246f7fd815ac042183086133cd9fe805bd47e15854776871bb7d384e419862c91503eeb82bfb419