Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-12-2024 22:01

General

  • Target

    fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    fd4a3af3861edfa99ca15c7b6dff39b2

  • SHA1

    00cd93349f4ab8a3b5896440e31dc899cd8585b6

  • SHA256

    af00e3c4645fac761a47656f84d5c2036307f00bb01a6fc5be008e5839e4a010

  • SHA512

    8e447c4c017f3573b7c13b01fa6f2bebcc24ebf7b1ca859fc216b16003b0feec95b21a45906c0d6d180a312a73a9b8c4b0cf9c7db336f3ba8d449a39ba09be4b

  • SSDEEP

    12288:BgHD+WWwXwSqYkjyPnV8GH2Yhpgqx+5R9BIPkMj3lH4cLRCUwphVlEAJqn4:BM+WnHMjyPV8o2Yv+YL31/LCtJ+4

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 7 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 3 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Drops file in System32 directory 8 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cAEvpYkO6g.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2108
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          3⤵
            PID:1624
          • C:\Users\Admin\AppData\Local\Temp\lpksetup-20240903-052916-0\fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\lpksetup-20240903-052916-0\fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:764
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\lpksetup-20240903-052916-0\fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2828
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2720
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\dmdskres2\dwm.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2852
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\it-IT\WmiPrvSE.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2656
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\wiatrace\wininit.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2620
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\wlansvc\taskhost.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2536
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\WF\dwm.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2316

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\cAEvpYkO6g.bat

        Filesize

        327B

        MD5

        d819e9ea81893a824fb579d614776c1a

        SHA1

        e458dc82ee2b5342698a1590e108b3d41a6b3c3f

        SHA256

        d4956b8604838dfe0219d45ed8c7b2ee79eea2d5eb499b565cdf6d3373a86157

        SHA512

        934fbf1c2e741e8ea6e5f3d549945125f56dbc596556e3df601f044686ae35bf18857148c197ddc104cd8899833c621b2c821e8549e6d7daf0d3ad3332d9fb49

      • C:\Windows\System32\wiatrace\wininit.exe

        Filesize

        1.2MB

        MD5

        fd4a3af3861edfa99ca15c7b6dff39b2

        SHA1

        00cd93349f4ab8a3b5896440e31dc899cd8585b6

        SHA256

        af00e3c4645fac761a47656f84d5c2036307f00bb01a6fc5be008e5839e4a010

        SHA512

        8e447c4c017f3573b7c13b01fa6f2bebcc24ebf7b1ca859fc216b16003b0feec95b21a45906c0d6d180a312a73a9b8c4b0cf9c7db336f3ba8d449a39ba09be4b

      • memory/764-25-0x0000000000030000-0x000000000015E000-memory.dmp

        Filesize

        1.2MB

      • memory/2256-0-0x000007FEF57F3000-0x000007FEF57F4000-memory.dmp

        Filesize

        4KB

      • memory/2256-1-0x0000000000BB0000-0x0000000000CDE000-memory.dmp

        Filesize

        1.2MB

      • memory/2256-2-0x000007FEF57F0000-0x000007FEF61DC000-memory.dmp

        Filesize

        9.9MB

      • memory/2256-22-0x000007FEF57F0000-0x000007FEF61DC000-memory.dmp

        Filesize

        9.9MB