Analysis
-
max time kernel
94s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 03:41
Behavioral task
behavioral1
Sample
e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
e9b76dd40f3d6b54aeb329467f261094
-
SHA1
f9c949ff9fee524fb7eefa3ce816adce0c1d78fd
-
SHA256
d28b646c459395738563e52b8ec7e831da311cb91c7b627aa5c9268117c32337
-
SHA512
3fb509e2b042d3abc89a3c72d3df7a45561461eeb4f39e1cce1f2c1d939b6206a898507a0074d2c1c24a80fb18e12b4e4c555a2dea5e8b3c563c6ea2e0bdee04
-
SSDEEP
24576:W2G/nvxW3W12U3WE31ghc4xzo3WdXRupmYvjfk19F37MSxTi/DJlT+4n:WbA3CWVCh3WLkmYrfKg/DiI
Malware Config
Signatures
-
DcRat 8 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 3520 schtasks.exe 2568 schtasks.exe 4056 schtasks.exe 2996 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe 3100 schtasks.exe 3044 schtasks.exe 216 schtasks.exe -
Dcrat family
-
Process spawned unexpected child process 7 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3100 2160 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3044 2160 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 216 2160 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3520 2160 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2568 2160 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4056 2160 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 2160 schtasks.exe 88 -
resource yara_rule behavioral2/files/0x000a000000023b6d-10.dat dcrat behavioral2/memory/876-13-0x0000000000CE0000-0x0000000000DF6000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation RuntimeperfnetDriversavesdll.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 876 RuntimeperfnetDriversavesdll.exe 3588 sihost.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\PerfLogs\\smss.exe\"" RuntimeperfnetDriversavesdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\Windows\\System32\\cfmifsproxy\\sihost.exe\"" RuntimeperfnetDriversavesdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Windows\\SysWOW64\\MbaeApiPublic\\cmd.exe\"" RuntimeperfnetDriversavesdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Documents and Settings\\smss.exe\"" RuntimeperfnetDriversavesdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Documents and Settings\\conhost.exe\"" RuntimeperfnetDriversavesdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Windows\\twain_32\\explorer.exe\"" RuntimeperfnetDriversavesdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeperfnetDriversavesdll = "\"C:\\Documents and Settings\\RuntimeperfnetDriversavesdll.exe\"" RuntimeperfnetDriversavesdll.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\System32\cfmifsproxy\sihost.exe RuntimeperfnetDriversavesdll.exe File created C:\Windows\System32\cfmifsproxy\66fc9ff0ee96c2b21f0cfded48750ae9e3032bf3 RuntimeperfnetDriversavesdll.exe File created C:\Windows\SysWOW64\MbaeApiPublic\cmd.exe RuntimeperfnetDriversavesdll.exe File created C:\Windows\SysWOW64\MbaeApiPublic\ebf1f9fa8afd6d1932bd65bc4cc3af89a4c8e228 RuntimeperfnetDriversavesdll.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\twain_32\explorer.exe RuntimeperfnetDriversavesdll.exe File created C:\Windows\twain_32\7a0fd90576e08807bde2cc57bcf9854bbce05fe3 RuntimeperfnetDriversavesdll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2996 schtasks.exe 3100 schtasks.exe 3044 schtasks.exe 216 schtasks.exe 3520 schtasks.exe 2568 schtasks.exe 4056 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 876 RuntimeperfnetDriversavesdll.exe 876 RuntimeperfnetDriversavesdll.exe 876 RuntimeperfnetDriversavesdll.exe 3588 sihost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 876 RuntimeperfnetDriversavesdll.exe Token: SeDebugPrivilege 3588 sihost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1144 2228 e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe 82 PID 2228 wrote to memory of 1144 2228 e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe 82 PID 2228 wrote to memory of 1144 2228 e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe 82 PID 1144 wrote to memory of 4196 1144 WScript.exe 83 PID 1144 wrote to memory of 4196 1144 WScript.exe 83 PID 1144 wrote to memory of 4196 1144 WScript.exe 83 PID 4196 wrote to memory of 876 4196 cmd.exe 85 PID 4196 wrote to memory of 876 4196 cmd.exe 85 PID 876 wrote to memory of 3588 876 RuntimeperfnetDriversavesdll.exe 96 PID 876 wrote to memory of 3588 876 RuntimeperfnetDriversavesdll.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e9b76dd40f3d6b54aeb329467f261094_JaffaCakes118.exe"1⤵
- DcRat
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Runtimeperfnet\1syNKYwmRXGdL3fLPtIqT.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Runtimeperfnet\ZSSFBj4h8UyaWrgI.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Runtimeperfnet\RuntimeperfnetDriversavesdll.exe"C:\Runtimeperfnet\RuntimeperfnetDriversavesdll.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\System32\cfmifsproxy\sihost.exe"C:\Windows\System32\cfmifsproxy\sihost.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeperfnetDriversavesdll" /sc ONLOGON /tr "'C:\Documents and Settings\RuntimeperfnetDriversavesdll.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\PerfLogs\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\System32\cfmifsproxy\sihost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:216
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Windows\SysWOW64\MbaeApiPublic\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Documents and Settings\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Documents and Settings\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\twain_32\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2996
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD537cf337b8f57bdb83988391601c164fd
SHA13addd11c005d3f111b5158b114b0dc8b9ee9836e
SHA256c91a015ddbed9ee199867730961b1ee293cf257b0abc260d35e53dc23b8a87af
SHA512d3a2c40786628a01b37c93e20f9d82512a5c53881b7f6db5e5babd4f7e92893526a794dc5652f3cf342bed40eb3a4a56e2404b0198f7b24093958ac825b49451
-
Filesize
1.1MB
MD58169d77b386f287c2a82e16b4946eec3
SHA140d37a341d757efa9f3bdccecd76d7bd4aa76827
SHA25612215f07467ec46ec06d2a1c734dc0dc40d66c3b27bcebaebbdc3f0f0792c450
SHA5129d82106531ddf6d452b229977956aa719b1f0ad7b20fdc328ec6b0bcd7e7915a132df12087f1c87e835808d4c8763e167f7ee9462ec1e53e3099fd4b34d18639
-
Filesize
52B
MD5324b5e03c3a74a39afd97c6021786a36
SHA168e090d02ddef65f18fc7539cfca1851e3aee226
SHA256ce90253c373590ee106fdf14419dbac112d81955c57c9194029bd462bd90d3ec
SHA5128f6f45347b682baa3aa4e5307586f6c29dc6d6fb557427e887950bf947bde2bab3cecedfd70caabfa6ec5d22041988c59a096fce3224bb0d71bc3d8afcef28bd