Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 18:26
Behavioral task
behavioral1
Sample
JaffaCakes118_3381479bab1dcacfbb8a7e4a4537f5f9.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3381479bab1dcacfbb8a7e4a4537f5f9.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3381479bab1dcacfbb8a7e4a4537f5f9.exe
-
Size
1.2MB
-
MD5
3381479bab1dcacfbb8a7e4a4537f5f9
-
SHA1
771087a449813a1ab214aec8447122d28d772bfd
-
SHA256
e0b451a5258bdacc66d22f0e7b45b67cb35a5bb7acab07aac122bd472e5a0827
-
SHA512
a062dc024ba2effa2373790775f103cc8a14662ce444280b631656c816832f4e173f4e943c1efa0e8f39a0e66c77a2ccfe47df25970944bba47610f02932af73
-
SSDEEP
24576:s2G/nvxW3WvpSbNLEJxpseQihFqfmVPOBBD+4L:sbA3WM9MxBTZ3m
Malware Config
Signatures
-
DcRat 9 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 1372 schtasks.exe 2864 schtasks.exe 1648 schtasks.exe 2736 schtasks.exe 2980 schtasks.exe 576 schtasks.exe 1288 schtasks.exe 1396 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3381479bab1dcacfbb8a7e4a4537f5f9.exe -
Dcrat family
-
Process spawned unexpected child process 8 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 576 2844 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2980 2844 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1372 2844 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2864 2844 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1648 2844 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2736 2844 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1288 2844 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1396 2844 schtasks.exe 34 -
resource yara_rule behavioral1/files/0x0008000000016c66-9.dat dcrat behavioral1/memory/2784-13-0x0000000000CB0000-0x0000000000D9C000-memory.dmp dcrat behavioral1/memory/816-36-0x0000000000D40000-0x0000000000E2C000-memory.dmp dcrat -
Executes dropped EXE 2 IoCs
pid Process 2784 FontwinintoRefdllNet.exe 816 csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 2096 cmd.exe 2096 cmd.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\System32\\mf\\winlogon.exe\"" FontwinintoRefdllNet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\System32\\pcadm\\spoolsv.exe\"" FontwinintoRefdllNet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files\\Common Files\\Microsoft Shared\\Stationery\\csrss.exe\"" FontwinintoRefdllNet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Windows\\Logs\\DISM\\wininit.exe\"" FontwinintoRefdllNet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\System32\\wow64win\\winlogon.exe\"" FontwinintoRefdllNet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\System32\\wship6\\lsm.exe\"" FontwinintoRefdllNet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsm = "\"C:\\Windows\\System32\\mfc110cht\\lsm.exe\"" FontwinintoRefdllNet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\Program Files\\Common Files\\Microsoft Shared\\OfficeSoftwareProtectionPlatform\\OSPPOBJS\\OSPPSVC.exe\"" FontwinintoRefdllNet.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\System32\pcadm\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4 FontwinintoRefdllNet.exe File created C:\Windows\System32\wow64win\cc11b995f2a76da408ea6a601e682e64743153ad FontwinintoRefdllNet.exe File created C:\Windows\System32\wship6\101b941d020240259ca4912829b53995ad543df6 FontwinintoRefdllNet.exe File created C:\Windows\System32\mfc110cht\lsm.exe FontwinintoRefdllNet.exe File created C:\Windows\System32\mf\winlogon.exe FontwinintoRefdllNet.exe File created C:\Windows\System32\pcadm\spoolsv.exe FontwinintoRefdllNet.exe File created C:\Windows\System32\wow64win\winlogon.exe FontwinintoRefdllNet.exe File created C:\Windows\System32\wship6\lsm.exe FontwinintoRefdllNet.exe File created C:\Windows\System32\mfc110cht\101b941d020240259ca4912829b53995ad543df6 FontwinintoRefdllNet.exe File created C:\Windows\System32\mf\cc11b995f2a76da408ea6a601e682e64743153ad FontwinintoRefdllNet.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Stationery\csrss.exe FontwinintoRefdllNet.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\csrss.exe FontwinintoRefdllNet.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\886983d96e3d3e31032c679b2d4ea91b6c05afef FontwinintoRefdllNet.exe File created C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPOBJS\OSPPSVC.exe FontwinintoRefdllNet.exe File created C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPOBJS\1610b97d3ab4a74cd8ae104b51bea7bfcc5b9c6f FontwinintoRefdllNet.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Logs\DISM\wininit.exe FontwinintoRefdllNet.exe File created C:\Windows\Logs\DISM\560854153607923c4c5f107085a7db67be01f252 FontwinintoRefdllNet.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3381479bab1dcacfbb8a7e4a4537f5f9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2736 schtasks.exe 1288 schtasks.exe 1396 schtasks.exe 576 schtasks.exe 2980 schtasks.exe 1372 schtasks.exe 2864 schtasks.exe 1648 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2784 FontwinintoRefdllNet.exe 2784 FontwinintoRefdllNet.exe 2784 FontwinintoRefdllNet.exe 2784 FontwinintoRefdllNet.exe 2784 FontwinintoRefdllNet.exe 816 csrss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2784 FontwinintoRefdllNet.exe Token: SeDebugPrivilege 816 csrss.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1904 1720 JaffaCakes118_3381479bab1dcacfbb8a7e4a4537f5f9.exe 30 PID 1720 wrote to memory of 1904 1720 JaffaCakes118_3381479bab1dcacfbb8a7e4a4537f5f9.exe 30 PID 1720 wrote to memory of 1904 1720 JaffaCakes118_3381479bab1dcacfbb8a7e4a4537f5f9.exe 30 PID 1720 wrote to memory of 1904 1720 JaffaCakes118_3381479bab1dcacfbb8a7e4a4537f5f9.exe 30 PID 1904 wrote to memory of 2096 1904 WScript.exe 31 PID 1904 wrote to memory of 2096 1904 WScript.exe 31 PID 1904 wrote to memory of 2096 1904 WScript.exe 31 PID 1904 wrote to memory of 2096 1904 WScript.exe 31 PID 2096 wrote to memory of 2784 2096 cmd.exe 33 PID 2096 wrote to memory of 2784 2096 cmd.exe 33 PID 2096 wrote to memory of 2784 2096 cmd.exe 33 PID 2096 wrote to memory of 2784 2096 cmd.exe 33 PID 2784 wrote to memory of 816 2784 FontwinintoRefdllNet.exe 43 PID 2784 wrote to memory of 816 2784 FontwinintoRefdllNet.exe 43 PID 2784 wrote to memory of 816 2784 FontwinintoRefdllNet.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3381479bab1dcacfbb8a7e4a4537f5f9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3381479bab1dcacfbb8a7e4a4537f5f9.exe"1⤵
- DcRat
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Fontwininto\WsMKGuTKQDoUceIpFc.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Fontwininto\Q8Jl1DujYt.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Roaming\Fontwininto\FontwinintoRefdllNet.exe"C:\Users\Admin\AppData\Roaming\Fontwininto\FontwinintoRefdllNet.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files\Common Files\Microsoft Shared\Stationery\csrss.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\csrss.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:816
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\Common Files\Microsoft Shared\Stationery\csrss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\Logs\DISM\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\wow64win\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\wship6\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\mfc110cht\lsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1648
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPOBJS\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2736
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\mf\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\pcadm\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1396
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD597e115a1bf240df8c7e2fc4af9bb2f19
SHA1431d2f966b8c228ffaf52ca94ed47506ece641ec
SHA256caac133a0bc69373d7a39ccf8be005d00873e91be6909c3d61f446798ba70360
SHA512a7a3c5250af1a1df5d78d30edc96521a659764c4aece6d4b6238b5bca431e4e976ccd204697e177a337587c3cf960e5f9c0d39a031e4660cfd7d5897e24fced5
-
Filesize
205B
MD502a82d3b9ba301e2021ae64c83fb6ae5
SHA107436b2f55fc4cf70e880ea1b5372e012d68df8a
SHA256d7d37b4bcea8754e1a3d11aec318ad00b0d2ec9c46818be98dc608282a204582
SHA512d6cbd89ecfe65647274cbc476f15beeb624f274afdfa4fc78ef92a1ad000b72bf94174c56e63da24a1d36d1f2e851f7cdf59ee330b19344d26b818f92ede3613
-
Filesize
912KB
MD51ec0ef270ff4b08fa5b6436ab0ed39d0
SHA1363e5655608be17b3ba57bf54cd2de3be943afb4
SHA25698372c461f60eb37116d1a876433e4d333126ddbec61cfafa7e4ed64a9f7a844
SHA5120d08cf20e83e876b82baf7bb04b829f67fe0afab262685a25012f3789541e484fb893647ede9ff2dc48d617c647564ef1533cdd54ecfe5c9838344b072b22bd9