Analysis
-
max time kernel
93s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 01:11
Behavioral task
behavioral1
Sample
JaffaCakes118_45040416d519b7447a2a2ade5bd930e1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_45040416d519b7447a2a2ade5bd930e1.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_45040416d519b7447a2a2ade5bd930e1.exe
-
Size
1.2MB
-
MD5
45040416d519b7447a2a2ade5bd930e1
-
SHA1
acd8113a92ac889e8155353ad7b273fd277652d0
-
SHA256
f7a57529f19db7d7441e106f36a9c50930df5008669847a7d2625f184c76b26c
-
SHA512
e9d2323bb20daaf073cb5536942b8db7e2a8b63705ec4913ffe18cf935372a6e72f7a1946c0b1ecc8b973077c4972ba15dd3b3b52f05c3f3d3f93118312f35f9
-
SSDEEP
24576:u2G/nvxW3WieCeBHFKDfzK4x2jlGhn/KefXD7H44Z+43:ubA3jeHFKzO+swX/E6
Malware Config
Signatures
-
DcRat 7 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 1568 schtasks.exe 1908 schtasks.exe 3896 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_45040416d519b7447a2a2ade5bd930e1.exe 3924 schtasks.exe 1808 schtasks.exe 3676 schtasks.exe -
Dcrat family
-
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1808 640 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3676 640 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3924 640 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1568 640 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1908 640 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3896 640 schtasks.exe 88 -
resource yara_rule behavioral2/files/0x0007000000023c9c-10.dat dcrat behavioral2/memory/3908-13-0x0000000000A00000-0x0000000000AFA000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation JaffaCakes118_45040416d519b7447a2a2ade5bd930e1.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation SessionHostmonitorNetsavesHost.exe -
Executes dropped EXE 2 IoCs
pid Process 3908 SessionHostmonitorNetsavesHost.exe 1400 Registry.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Documents and Settings\\Registry.exe\"" SessionHostmonitorNetsavesHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Program Files (x86)\\Internet Explorer\\ja-JP\\sysmon.exe\"" SessionHostmonitorNetsavesHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Windows\\bfsvc\\sysmon.exe\"" SessionHostmonitorNetsavesHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Program Files (x86)\\Windows Sidebar\\Shared Gadgets\\Registry.exe\"" SessionHostmonitorNetsavesHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\Cortana.Internal.Search\\SearchApp.exe\"" SessionHostmonitorNetsavesHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cmd = "\"C:\\Windows\\SysWOW64\\mfnetcore\\cmd.exe\"" SessionHostmonitorNetsavesHost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\mfnetcore\cmd.exe SessionHostmonitorNetsavesHost.exe File created C:\Windows\SysWOW64\mfnetcore\ebf1f9fa8afd6d1932bd65bc4cc3af89a4c8e228 SessionHostmonitorNetsavesHost.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\ja-JP\sysmon.exe SessionHostmonitorNetsavesHost.exe File created C:\Program Files (x86)\Internet Explorer\ja-JP\121e5b5079f7c0e46d90f99b3864022518bbbda9 SessionHostmonitorNetsavesHost.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\Registry.exe SessionHostmonitorNetsavesHost.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\ee2ad38f3d43822fe0c92830b00d06adc71395d2 SessionHostmonitorNetsavesHost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\bfsvc\sysmon.exe SessionHostmonitorNetsavesHost.exe File created C:\Windows\bfsvc\121e5b5079f7c0e46d90f99b3864022518bbbda9 SessionHostmonitorNetsavesHost.exe File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\Cortana.Internal.Search\SearchApp.exe SessionHostmonitorNetsavesHost.exe File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\Cortana.Internal.Search\38384e6a620884a6b69bcc56f80d556f9200171c SessionHostmonitorNetsavesHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_45040416d519b7447a2a2ade5bd930e1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings JaffaCakes118_45040416d519b7447a2a2ade5bd930e1.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3896 schtasks.exe 1808 schtasks.exe 3676 schtasks.exe 3924 schtasks.exe 1568 schtasks.exe 1908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3908 SessionHostmonitorNetsavesHost.exe 3908 SessionHostmonitorNetsavesHost.exe 3908 SessionHostmonitorNetsavesHost.exe 1400 Registry.exe 1400 Registry.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3908 SessionHostmonitorNetsavesHost.exe Token: SeDebugPrivilege 1400 Registry.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3544 wrote to memory of 4964 3544 JaffaCakes118_45040416d519b7447a2a2ade5bd930e1.exe 83 PID 3544 wrote to memory of 4964 3544 JaffaCakes118_45040416d519b7447a2a2ade5bd930e1.exe 83 PID 3544 wrote to memory of 4964 3544 JaffaCakes118_45040416d519b7447a2a2ade5bd930e1.exe 83 PID 4964 wrote to memory of 2164 4964 WScript.exe 85 PID 4964 wrote to memory of 2164 4964 WScript.exe 85 PID 4964 wrote to memory of 2164 4964 WScript.exe 85 PID 2164 wrote to memory of 3908 2164 cmd.exe 87 PID 2164 wrote to memory of 3908 2164 cmd.exe 87 PID 3908 wrote to memory of 1400 3908 SessionHostmonitorNetsavesHost.exe 96 PID 3908 wrote to memory of 1400 3908 SessionHostmonitorNetsavesHost.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_45040416d519b7447a2a2ade5bd930e1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_45040416d519b7447a2a2ade5bd930e1.exe"1⤵
- DcRat
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\SessionHostmonitorNet\l7Qt4LA8iP1KynAPjmfGY.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\SessionHostmonitorNet\WqDHbfuIZom1r.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\SessionHostmonitorNet\SessionHostmonitorNetsavesHost.exe"C:\SessionHostmonitorNet\SessionHostmonitorNetsavesHost.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\Registry.exe"C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\Registry.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Documents and Settings\Registry.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\ja-JP\sysmon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3676
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\bfsvc\sysmon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\Registry.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\Cortana.Internal.Search\SearchApp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Windows\SysWOW64\mfnetcore\cmd.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3896
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
970KB
MD5489c2f03208d40a364b588418a03d764
SHA13e3cbe6fb776c71ea14c7043d3c8745d3f8b83cd
SHA25628f0ee1231e99afde073db4e1b1a87c196dc365b27998642384f8a2d38efe5dc
SHA512f3166f88cd89d767916710bb445bedf539e558ee8cb5088bc91ce8c657167f6a6d81900eea0def2171a42e87f91e67cf1f82f2958a7d574b4770fd37a80b0018
-
Filesize
72B
MD518496ae7e3aed282f98f45acec37dd3c
SHA1f7b318ccb7024ecefcef4e80fe9a778472f55265
SHA2562a9d21f9fe7245b3141678d7bb4da0e4e9e72336b66015b6905a44717c4debb8
SHA5120d9dfec7d3435643989f3afe0fa57876d2e6a9a8a9caebb96aa2b29ba4c61c7d8e38128333b91ad2092061bccaa070f3a7ca15b720986a49071115283fc78f4f
-
Filesize
222B
MD565c164be50684e9e4fc454d592da65f9
SHA19e228ef896eba663e4f8490c2e8322cb920be6b2
SHA256230b38e2ecb8545890f4249349b6c7e41e048e601446a7107184da19ac87bfef
SHA512fdc602fec0637a4ec3101994917a8b76543381a5b80a00619b21361f7628b7fc5d6c45df71f69a7b9a17f71fc4a2e106f524c4e8f50a7555c3124e821968f703