Analysis
-
max time kernel
93s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 17:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe
-
Size
2.9MB
-
MD5
70efb1bfc943310507e345e5d4c4659a
-
SHA1
4d770f651e9e206983d2223ddb8ce7489b59dce2
-
SHA256
143a4aac0008786b5dc5c9f1fd94536c535e3a24f064526bba8f5b49bcdb2810
-
SHA512
e337ae217f42f304ff25cca3ec9272e375e3e66043def82c3cfa74c05e2b3415f3ac7244808fe263c452df0a7664abd024a33169a0bc4394d3ae5ee38e212b45
-
SSDEEP
49152:98wHWg2dOM7U8eEdHWls4K/c9TScxGuaGolGDISsA/0dwOZ/Szo+zCV:98wv2dOEBBWq1EVd53DI46FZ/Mov
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4948 4244 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4776 4244 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2740 4244 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1148 4244 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3380 4244 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3276 4244 schtasks.exe 83 -
resource yara_rule behavioral2/memory/2376-1-0x0000000000440000-0x0000000000A84000-memory.dmp dcrat behavioral2/memory/2376-2-0x0000000000440000-0x0000000000A84000-memory.dmp dcrat behavioral2/memory/2376-25-0x0000000000440000-0x0000000000A84000-memory.dmp dcrat behavioral2/memory/3920-29-0x00000000004C0000-0x0000000000B04000-memory.dmp dcrat behavioral2/memory/3920-30-0x00000000004C0000-0x0000000000B04000-memory.dmp dcrat behavioral2/memory/3920-31-0x00000000004C0000-0x0000000000B04000-memory.dmp dcrat behavioral2/memory/3920-35-0x00000000004C0000-0x0000000000B04000-memory.dmp dcrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ System.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion System.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion System.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe -
Executes dropped EXE 1 IoCs
pid Process 3920 System.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine System.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\AppxSignature\\SearchApp.exe\"" JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartMenuExperienceHost = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\\resources\\StartMenuExperienceHost.exe\"" JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\Windows.Internal.UI.Logon.ProxyStub\\RuntimeBroker.exe\"" JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Windows\\L2Schemas\\Registry.exe\"" JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Windows\\BitLockerDiscoveryVolumeContents\\System.exe\"" JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\CertPolEng\\dwm.exe\"" JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\CertPolEng\dwm.exe JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe File created C:\Windows\SysWOW64\CertPolEng\6cb0b6c459d5d3455a3da700e713f2e2529862ff JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe File created C:\Windows\SysWOW64\Windows.Internal.UI.Logon.ProxyStub\RuntimeBroker.exe JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe File created C:\Windows\SysWOW64\Windows.Internal.UI.Logon.ProxyStub\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2376 JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe 3920 System.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\L2Schemas\ee2ad38f3d43822fe0c92830b00d06adc71395d2 JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe File created C:\Windows\BitLockerDiscoveryVolumeContents\System.exe JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe File created C:\Windows\BitLockerDiscoveryVolumeContents\27d1bcfc3c54e0e44ea423ffd4ee81fe73670a2a JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\AppxSignature\SearchApp.exe JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe File created C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\resources\55b276f4edf653fe07efe8f1ecc32d3d195abd16 JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe File created C:\Windows\L2Schemas\Registry.exe JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe File opened for modification C:\Windows\L2Schemas\Registry.exe JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\AppxSignature\38384e6a620884a6b69bcc56f80d556f9200171c JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe File created C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\resources\StartMenuExperienceHost.exe JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w32tm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language System.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2740 schtasks.exe 1148 schtasks.exe 3380 schtasks.exe 3276 schtasks.exe 4948 schtasks.exe 4776 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2376 JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe 2376 JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe 2376 JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe 2376 JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe 2376 JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe 2376 JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe 2376 JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe 3920 System.exe 3920 System.exe 3920 System.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2376 JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe Token: SeDebugPrivilege 3920 System.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2376 wrote to memory of 4612 2376 JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe 91 PID 2376 wrote to memory of 4612 2376 JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe 91 PID 2376 wrote to memory of 4612 2376 JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe 91 PID 4612 wrote to memory of 736 4612 cmd.exe 93 PID 4612 wrote to memory of 736 4612 cmd.exe 93 PID 4612 wrote to memory of 736 4612 cmd.exe 93 PID 736 wrote to memory of 2696 736 w32tm.exe 94 PID 736 wrote to memory of 2696 736 w32tm.exe 94 PID 4612 wrote to memory of 3920 4612 cmd.exe 96 PID 4612 wrote to memory of 3920 4612 cmd.exe 96 PID 4612 wrote to memory of 3920 4612 cmd.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_70efb1bfc943310507e345e5d4c4659a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZHIv67QnYC.bat"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵PID:2696
-
-
-
C:\Windows\BitLockerDiscoveryVolumeContents\System.exe"C:\Windows\BitLockerDiscoveryVolumeContents\System.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Windows\L2Schemas\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\BitLockerDiscoveryVolumeContents\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\CertPolEng\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\AppxSignature\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\resources\StartMenuExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\Windows.Internal.UI.Logon.ProxyStub\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3276
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD5210cf1eb2d3339fa01ada9303cb10f3c
SHA1aea2afa7fcfbb14d219f4f840da62683fbc687f8
SHA256a8b78b04971061244c79bd43680c776f364c0ad3bf7b7478003cf9d6d8d1b128
SHA512a66736628ec3a86b123259c88102f6043f6f289ca6edddbc2709612f0a4acfefbe5e3e73187a03e9a9e2f80feca664dd7399465a2a7b36cdba53b8d750e40a46
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\resources\StartMenuExperienceHost.exe
Filesize2.9MB
MD570efb1bfc943310507e345e5d4c4659a
SHA14d770f651e9e206983d2223ddb8ce7489b59dce2
SHA256143a4aac0008786b5dc5c9f1fd94536c535e3a24f064526bba8f5b49bcdb2810
SHA512e337ae217f42f304ff25cca3ec9272e375e3e66043def82c3cfa74c05e2b3415f3ac7244808fe263c452df0a7664abd024a33169a0bc4394d3ae5ee38e212b45