Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 03:41
Behavioral task
behavioral1
Sample
e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
e9b76dd40f3d6b54aeb329467f261094
-
SHA1
f9c949ff9fee524fb7eefa3ce816adce0c1d78fd
-
SHA256
d28b646c459395738563e52b8ec7e831da311cb91c7b627aa5c9268117c32337
-
SHA512
3fb509e2b042d3abc89a3c72d3df7a45561461eeb4f39e1cce1f2c1d939b6206a898507a0074d2c1c24a80fb18e12b4e4c555a2dea5e8b3c563c6ea2e0bdee04
-
SSDEEP
24576:W2G/nvxW3W12U3WE31ghc4xzo3WdXRupmYvjfk19F37MSxTi/DJlT+4n:WbA3CWVCh3WLkmYrfKg/DiI
Malware Config
Signatures
-
DcRat 8 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 2628 schtasks.exe 2012 schtasks.exe 2180 schtasks.exe 1632 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe 2736 schtasks.exe 2644 schtasks.exe 2888 schtasks.exe -
Dcrat family
-
Process spawned unexpected child process 7 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2888 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2012 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2180 2744 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 2744 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x0007000000015cdc-12.dat dcrat behavioral1/memory/2300-13-0x00000000002F0000-0x0000000000406000-memory.dmp dcrat behavioral1/memory/1680-34-0x0000000000E70000-0x0000000000F86000-memory.dmp dcrat -
Executes dropped EXE 2 IoCs
pid Process 2300 RuntimeperfnetDriversavesdll.exe 1680 csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 2148 cmd.exe 2148 cmd.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\ProgramData\\Microsoft Help\\csrss.exe\"" RuntimeperfnetDriversavesdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\System32\\bthci\\winlogon.exe\"" RuntimeperfnetDriversavesdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Program Files\\Windows Media Player\\es-ES\\WmiPrvSE.exe\"" RuntimeperfnetDriversavesdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\cmd.exe\"" RuntimeperfnetDriversavesdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\sqlceoledb30\\dwm.exe\"" RuntimeperfnetDriversavesdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files (x86)\\Windows Defender\\ja-JP\\csrss.exe\"" RuntimeperfnetDriversavesdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files\\Common Files\\Microsoft Shared\\OfficeSoftwareProtectionPlatform\\osppobjs-spp-plugin-manifest-signed\\OSPPSVC.exe\"" RuntimeperfnetDriversavesdll.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\System32\sqlceoledb30\6cb0b6c459d5d3455a3da700e713f2e2529862ff RuntimeperfnetDriversavesdll.exe File created C:\Windows\System32\bthci\winlogon.exe RuntimeperfnetDriversavesdll.exe File created C:\Windows\System32\bthci\cc11b995f2a76da408ea6a601e682e64743153ad RuntimeperfnetDriversavesdll.exe File created C:\Windows\System32\sqlceoledb30\dwm.exe RuntimeperfnetDriversavesdll.exe File opened for modification C:\Windows\System32\sqlceoledb30\dwm.exe RuntimeperfnetDriversavesdll.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\ja-JP\csrss.exe RuntimeperfnetDriversavesdll.exe File created C:\Program Files (x86)\Windows Defender\ja-JP\886983d96e3d3e31032c679b2d4ea91b6c05afef RuntimeperfnetDriversavesdll.exe File created C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppobjs-spp-plugin-manifest-signed\OSPPSVC.exe RuntimeperfnetDriversavesdll.exe File created C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppobjs-spp-plugin-manifest-signed\1610b97d3ab4a74cd8ae104b51bea7bfcc5b9c6f RuntimeperfnetDriversavesdll.exe File created C:\Program Files\Windows Media Player\es-ES\WmiPrvSE.exe RuntimeperfnetDriversavesdll.exe File created C:\Program Files\Windows Media Player\es-ES\24dbde2999530ef5fd907494bc374d663924116c RuntimeperfnetDriversavesdll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2736 schtasks.exe 2644 schtasks.exe 2888 schtasks.exe 2628 schtasks.exe 2012 schtasks.exe 2180 schtasks.exe 1632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2300 RuntimeperfnetDriversavesdll.exe 1680 csrss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2300 RuntimeperfnetDriversavesdll.exe Token: SeDebugPrivilege 1680 csrss.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1992 2368 e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1992 2368 e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1992 2368 e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1992 2368 e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2148 1992 WScript.exe 32 PID 1992 wrote to memory of 2148 1992 WScript.exe 32 PID 1992 wrote to memory of 2148 1992 WScript.exe 32 PID 1992 wrote to memory of 2148 1992 WScript.exe 32 PID 2148 wrote to memory of 2300 2148 cmd.exe 34 PID 2148 wrote to memory of 2300 2148 cmd.exe 34 PID 2148 wrote to memory of 2300 2148 cmd.exe 34 PID 2148 wrote to memory of 2300 2148 cmd.exe 34 PID 2300 wrote to memory of 1680 2300 RuntimeperfnetDriversavesdll.exe 43 PID 2300 wrote to memory of 1680 2300 RuntimeperfnetDriversavesdll.exe 43 PID 2300 wrote to memory of 1680 2300 RuntimeperfnetDriversavesdll.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe"1⤵
- DcRat
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Runtimeperfnet\1syNKYwmRXGdL3fLPtIqT.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Runtimeperfnet\ZSSFBj4h8UyaWrgI.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Runtimeperfnet\RuntimeperfnetDriversavesdll.exe"C:\Runtimeperfnet\RuntimeperfnetDriversavesdll.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\ProgramData\Microsoft Help\csrss.exe"C:\ProgramData\Microsoft Help\csrss.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\sqlceoledb30\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\ja-JP\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2644
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\osppobjs-spp-plugin-manifest-signed\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\ProgramData\Microsoft Help\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\bthci\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\es-ES\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD537cf337b8f57bdb83988391601c164fd
SHA13addd11c005d3f111b5158b114b0dc8b9ee9836e
SHA256c91a015ddbed9ee199867730961b1ee293cf257b0abc260d35e53dc23b8a87af
SHA512d3a2c40786628a01b37c93e20f9d82512a5c53881b7f6db5e5babd4f7e92893526a794dc5652f3cf342bed40eb3a4a56e2404b0198f7b24093958ac825b49451
-
Filesize
1.1MB
MD58169d77b386f287c2a82e16b4946eec3
SHA140d37a341d757efa9f3bdccecd76d7bd4aa76827
SHA25612215f07467ec46ec06d2a1c734dc0dc40d66c3b27bcebaebbdc3f0f0792c450
SHA5129d82106531ddf6d452b229977956aa719b1f0ad7b20fdc328ec6b0bcd7e7915a132df12087f1c87e835808d4c8763e167f7ee9462ec1e53e3099fd4b34d18639
-
Filesize
52B
MD5324b5e03c3a74a39afd97c6021786a36
SHA168e090d02ddef65f18fc7539cfca1851e3aee226
SHA256ce90253c373590ee106fdf14419dbac112d81955c57c9194029bd462bd90d3ec
SHA5128f6f45347b682baa3aa4e5307586f6c29dc6d6fb557427e887950bf947bde2bab3cecedfd70caabfa6ec5d22041988c59a096fce3224bb0d71bc3d8afcef28bd