Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 12:54
Behavioral task
behavioral1
Sample
eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe
-
Size
747KB
-
MD5
eb9929b2a05ca8aaffe501e498bd0301
-
SHA1
2a648717022fbe526f07c6827796d0f2a767cae2
-
SHA256
f0904890533c32e6fcbe160eb0055c55d7eff868002cf638b4806b26593c2638
-
SHA512
3b0f9441f72b1ddafd121da04e53fd89af2e68cf37aeb92c9aea5d9b47a21b5d4f4fa7bd85196b08442c18e5423182f1cc9d3d71ed9fd5ec518fd48ef0c33f20
-
SSDEEP
12288:ek0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/9/+rnkT:z0QRWoJEfg0oChGdJQbjPbNW5tYeP+Gp
Malware Config
Extracted
darkcomet
Guest16
melidas.no-ip.org:1604
DC_MUTEX-W6URBQG
-
InstallPath
MSDCSC\Rundll32.exe
-
gencode
tduXnWzfAFR4
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
Rundll32
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\MSDCSC\\Rundll32.exe" eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" Rundll32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile Rundll32.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" Rundll32.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" Rundll32.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4984 Rundll32.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rundll32 = "C:\\Windows\\MSDCSC\\Rundll32.exe" eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\MSDCSC\Rundll32.exe eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe File opened for modification C:\Windows\MSDCSC\Rundll32.exe eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe File opened for modification C:\Windows\MSDCSC\ eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeSecurityPrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeLoadDriverPrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeSystemProfilePrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeSystemtimePrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeBackupPrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeRestorePrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeShutdownPrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeDebugPrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeUndockPrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeManageVolumePrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeImpersonatePrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: 33 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: 34 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: 35 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: 36 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 4984 Rundll32.exe Token: SeSecurityPrivilege 4984 Rundll32.exe Token: SeTakeOwnershipPrivilege 4984 Rundll32.exe Token: SeLoadDriverPrivilege 4984 Rundll32.exe Token: SeSystemProfilePrivilege 4984 Rundll32.exe Token: SeSystemtimePrivilege 4984 Rundll32.exe Token: SeProfSingleProcessPrivilege 4984 Rundll32.exe Token: SeIncBasePriorityPrivilege 4984 Rundll32.exe Token: SeCreatePagefilePrivilege 4984 Rundll32.exe Token: SeBackupPrivilege 4984 Rundll32.exe Token: SeRestorePrivilege 4984 Rundll32.exe Token: SeShutdownPrivilege 4984 Rundll32.exe Token: SeDebugPrivilege 4984 Rundll32.exe Token: SeSystemEnvironmentPrivilege 4984 Rundll32.exe Token: SeChangeNotifyPrivilege 4984 Rundll32.exe Token: SeRemoteShutdownPrivilege 4984 Rundll32.exe Token: SeUndockPrivilege 4984 Rundll32.exe Token: SeManageVolumePrivilege 4984 Rundll32.exe Token: SeImpersonatePrivilege 4984 Rundll32.exe Token: SeCreateGlobalPrivilege 4984 Rundll32.exe Token: 33 4984 Rundll32.exe Token: 34 4984 Rundll32.exe Token: 35 4984 Rundll32.exe Token: 36 4984 Rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4984 Rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1236 wrote to memory of 4984 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe 82 PID 1236 wrote to memory of 4984 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe 82 PID 1236 wrote to memory of 4984 1236 eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb9929b2a05ca8aaffe501e498bd0301_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\MSDCSC\Rundll32.exe"C:\Windows\MSDCSC\Rundll32.exe"2⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4984
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
747KB
MD5eb9929b2a05ca8aaffe501e498bd0301
SHA12a648717022fbe526f07c6827796d0f2a767cae2
SHA256f0904890533c32e6fcbe160eb0055c55d7eff868002cf638b4806b26593c2638
SHA5123b0f9441f72b1ddafd121da04e53fd89af2e68cf37aeb92c9aea5d9b47a21b5d4f4fa7bd85196b08442c18e5423182f1cc9d3d71ed9fd5ec518fd48ef0c33f20