General
-
Target
JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c
-
Size
1.9MB
-
Sample
250108-2fpqpsyndm
-
MD5
b0464a68d3df95ccb9023830b6a2037c
-
SHA1
96a229ed8d9b3d26086fa10c9675203b4f5f4626
-
SHA256
11271bb4ead40385c854e9a19eef0d64578639066195361a5e4818d172f5bbfb
-
SHA512
02a80deec6b8089da6102c9763f39bb6d3d0bbee340a44f04f13226e4d8c69ae699076f7ef6eeeeb9e705bc1b7fe8c02399682ef52754ecfec09f4799345179f
-
SSDEEP
49152:HN54VMGOhLmPkO4koPyVu5eAEfgPwNqsruC:v0vEf8u5eAmFJ
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c
-
Size
1.9MB
-
MD5
b0464a68d3df95ccb9023830b6a2037c
-
SHA1
96a229ed8d9b3d26086fa10c9675203b4f5f4626
-
SHA256
11271bb4ead40385c854e9a19eef0d64578639066195361a5e4818d172f5bbfb
-
SHA512
02a80deec6b8089da6102c9763f39bb6d3d0bbee340a44f04f13226e4d8c69ae699076f7ef6eeeeb9e705bc1b7fe8c02399682ef52754ecfec09f4799345179f
-
SSDEEP
49152:HN54VMGOhLmPkO4koPyVu5eAEfgPwNqsruC:v0vEf8u5eAmFJ
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1