Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2025, 23:47
Behavioral task
behavioral1
Sample
JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe
-
Size
739KB
-
MD5
615d633b0e7337ef925cd3d5b2de15a1
-
SHA1
55dc10ff372c006b8fd7aabbfa6e2d66ba0ca7a1
-
SHA256
a950ba583d40737b5e52aa9adda09d5b38d1a2a316a44fc0fc36c12f5e46693b
-
SHA512
49e6bdfc51d6ac0fb62f2b54f0c647c1e127e26e58e393e59056a33306071a4f43a5aaa0ed66fe54f5b0116bbc1a8cfaa925785b1f46677a276a977a7eda1b72
-
SSDEEP
12288:C9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hF9Vel4Y:uZ1xuVVjfFoynPaVBUR8f+kN10EBXyld
Malware Config
Extracted
darkcomet
Guest16
lemonxrat.no-ip.org:4782
DC_MUTEX-FWDE5J0
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
A8VBRQNxecXD
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation msdcsc.exe -
Executes dropped EXE 4 IoCs
pid Process 3188 MW2 PWNER.EXE 4640 msdcsc.exe 4168 MW2 PWNER.EXE 4796 MW2 PWNER.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4640 set thread context of 4048 4640 msdcsc.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeSecurityPrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeTakeOwnershipPrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeLoadDriverPrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeSystemProfilePrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeSystemtimePrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeProfSingleProcessPrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeIncBasePriorityPrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeCreatePagefilePrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeBackupPrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeRestorePrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeShutdownPrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeDebugPrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeSystemEnvironmentPrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeChangeNotifyPrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeRemoteShutdownPrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeUndockPrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeManageVolumePrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeImpersonatePrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeCreateGlobalPrivilege 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: 33 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: 34 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: 35 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: 36 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe Token: SeIncreaseQuotaPrivilege 4640 msdcsc.exe Token: SeSecurityPrivilege 4640 msdcsc.exe Token: SeTakeOwnershipPrivilege 4640 msdcsc.exe Token: SeLoadDriverPrivilege 4640 msdcsc.exe Token: SeSystemProfilePrivilege 4640 msdcsc.exe Token: SeSystemtimePrivilege 4640 msdcsc.exe Token: SeProfSingleProcessPrivilege 4640 msdcsc.exe Token: SeIncBasePriorityPrivilege 4640 msdcsc.exe Token: SeCreatePagefilePrivilege 4640 msdcsc.exe Token: SeBackupPrivilege 4640 msdcsc.exe Token: SeRestorePrivilege 4640 msdcsc.exe Token: SeShutdownPrivilege 4640 msdcsc.exe Token: SeDebugPrivilege 4640 msdcsc.exe Token: SeSystemEnvironmentPrivilege 4640 msdcsc.exe Token: SeChangeNotifyPrivilege 4640 msdcsc.exe Token: SeRemoteShutdownPrivilege 4640 msdcsc.exe Token: SeUndockPrivilege 4640 msdcsc.exe Token: SeManageVolumePrivilege 4640 msdcsc.exe Token: SeImpersonatePrivilege 4640 msdcsc.exe Token: SeCreateGlobalPrivilege 4640 msdcsc.exe Token: 33 4640 msdcsc.exe Token: 34 4640 msdcsc.exe Token: 35 4640 msdcsc.exe Token: 36 4640 msdcsc.exe Token: SeIncreaseQuotaPrivilege 4048 iexplore.exe Token: SeSecurityPrivilege 4048 iexplore.exe Token: SeTakeOwnershipPrivilege 4048 iexplore.exe Token: SeLoadDriverPrivilege 4048 iexplore.exe Token: SeSystemProfilePrivilege 4048 iexplore.exe Token: SeSystemtimePrivilege 4048 iexplore.exe Token: SeProfSingleProcessPrivilege 4048 iexplore.exe Token: SeIncBasePriorityPrivilege 4048 iexplore.exe Token: SeCreatePagefilePrivilege 4048 iexplore.exe Token: SeBackupPrivilege 4048 iexplore.exe Token: SeRestorePrivilege 4048 iexplore.exe Token: SeShutdownPrivilege 4048 iexplore.exe Token: SeDebugPrivilege 4048 iexplore.exe Token: SeSystemEnvironmentPrivilege 4048 iexplore.exe Token: SeChangeNotifyPrivilege 4048 iexplore.exe Token: SeRemoteShutdownPrivilege 4048 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4048 iexplore.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2364 wrote to memory of 3188 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe 83 PID 2364 wrote to memory of 3188 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe 83 PID 2364 wrote to memory of 4640 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe 84 PID 2364 wrote to memory of 4640 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe 84 PID 2364 wrote to memory of 4640 2364 JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe 84 PID 4640 wrote to memory of 4168 4640 msdcsc.exe 85 PID 4640 wrote to memory of 4168 4640 msdcsc.exe 85 PID 4640 wrote to memory of 4048 4640 msdcsc.exe 86 PID 4640 wrote to memory of 4048 4640 msdcsc.exe 86 PID 4640 wrote to memory of 4048 4640 msdcsc.exe 86 PID 4640 wrote to memory of 4048 4640 msdcsc.exe 86 PID 4640 wrote to memory of 4048 4640 msdcsc.exe 86 PID 4048 wrote to memory of 4796 4048 iexplore.exe 87 PID 4048 wrote to memory of 4796 4048 iexplore.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_615d633b0e7337ef925cd3d5b2de15a1.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\MW2 PWNER.EXE"C:\Users\Admin\AppData\Local\Temp\MW2 PWNER.EXE"2⤵
- Executes dropped EXE
PID:3188
-
-
C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe"C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\MW2 PWNER.EXE"C:\Users\Admin\AppData\Local\Temp\MW2 PWNER.EXE"3⤵
- Executes dropped EXE
PID:4168
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\MW2 PWNER.EXE"C:\Users\Admin\AppData\Local\Temp\MW2 PWNER.EXE"4⤵
- Executes dropped EXE
PID:4796
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
739KB
MD5615d633b0e7337ef925cd3d5b2de15a1
SHA155dc10ff372c006b8fd7aabbfa6e2d66ba0ca7a1
SHA256a950ba583d40737b5e52aa9adda09d5b38d1a2a316a44fc0fc36c12f5e46693b
SHA51249e6bdfc51d6ac0fb62f2b54f0c647c1e127e26e58e393e59056a33306071a4f43a5aaa0ed66fe54f5b0116bbc1a8cfaa925785b1f46677a276a977a7eda1b72
-
Filesize
78KB
MD5b1268f4dce4bfd64278b2c5166ef37da
SHA10fbc72144b9895db406ae2b1abc21e6471d96a54
SHA25623077a8e0a8cc8bde06f079438f265886fd12fed8f65628b0009fe2812ec149b
SHA51230fb7fe014c6a1c7bedfd01e964a86c01d9c8e419f120051f658febdf5b091aba0f5da407b3dd6ca348f13e21b8ef7734ca80df001657565f0db2bee2f37fd92