Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 22:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe
-
Size
1.9MB
-
MD5
b0464a68d3df95ccb9023830b6a2037c
-
SHA1
96a229ed8d9b3d26086fa10c9675203b4f5f4626
-
SHA256
11271bb4ead40385c854e9a19eef0d64578639066195361a5e4818d172f5bbfb
-
SHA512
02a80deec6b8089da6102c9763f39bb6d3d0bbee340a44f04f13226e4d8c69ae699076f7ef6eeeeb9e705bc1b7fe8c02399682ef52754ecfec09f4799345179f
-
SSDEEP
49152:HN54VMGOhLmPkO4koPyVu5eAEfgPwNqsruC:v0vEf8u5eAmFJ
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3160 2676 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4396 2676 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1820 2676 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4208 2676 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2024 2676 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4532 2676 schtasks.exe 83 -
resource yara_rule behavioral2/memory/4884-1-0x0000000000B50000-0x000000000104A000-memory.dmp dcrat behavioral2/memory/4884-2-0x0000000000B50000-0x000000000104A000-memory.dmp dcrat behavioral2/memory/4884-25-0x0000000000B50000-0x000000000104A000-memory.dmp dcrat behavioral2/memory/4632-30-0x0000000000430000-0x000000000092A000-memory.dmp dcrat behavioral2/memory/4632-31-0x0000000000430000-0x000000000092A000-memory.dmp dcrat behavioral2/memory/4632-38-0x0000000000430000-0x000000000092A000-memory.dmp dcrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ backgroundTaskHost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion backgroundTaskHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion backgroundTaskHost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe -
Executes dropped EXE 1 IoCs
pid Process 4632 backgroundTaskHost.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine backgroundTaskHost.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files (x86)\\Windows NT\\TableTextService\\en-US\\lsass.exe\"" JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\Users\\Default User\\upfc.exe\"" JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\WSDApi\\RuntimeBroker.exe\"" JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\netbios\\RuntimeBroker.exe\"" JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Recovery\\WindowsRE\\wininit.exe\"" JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Documents and Settings\\backgroundTaskHost.exe\"" JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\WSDApi\RuntimeBroker.exe JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe File opened for modification C:\Windows\SysWOW64\WSDApi\RuntimeBroker.exe JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe File created C:\Windows\SysWOW64\WSDApi\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe File created C:\Windows\SysWOW64\netbios\RuntimeBroker.exe JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe File created C:\Windows\SysWOW64\netbios\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4884 JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe 4632 backgroundTaskHost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\lsass.exe JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\6203df4a6bafc7c328ee7f6f8ca0a8a838a8a1b9 JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language backgroundTaskHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w32tm.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3160 schtasks.exe 4396 schtasks.exe 1820 schtasks.exe 4208 schtasks.exe 2024 schtasks.exe 4532 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4884 JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe 4884 JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe 4884 JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe 4632 backgroundTaskHost.exe 4632 backgroundTaskHost.exe 4632 backgroundTaskHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4884 JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe Token: SeDebugPrivilege 4632 backgroundTaskHost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4884 wrote to memory of 2968 4884 JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe 90 PID 4884 wrote to memory of 2968 4884 JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe 90 PID 4884 wrote to memory of 2968 4884 JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe 90 PID 2968 wrote to memory of 4908 2968 cmd.exe 92 PID 2968 wrote to memory of 4908 2968 cmd.exe 92 PID 2968 wrote to memory of 4908 2968 cmd.exe 92 PID 4908 wrote to memory of 2156 4908 w32tm.exe 93 PID 4908 wrote to memory of 2156 4908 w32tm.exe 93 PID 2968 wrote to memory of 4632 2968 cmd.exe 95 PID 2968 wrote to memory of 4632 2968 cmd.exe 95 PID 2968 wrote to memory of 4632 2968 cmd.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b0464a68d3df95ccb9023830b6a2037c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2Q4MpMu8sb.bat"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵PID:2156
-
-
-
C:\Documents and Settings\backgroundTaskHost.exe"C:\Documents and Settings\backgroundTaskHost.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\WSDApi\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\netbios\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Documents and Settings\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\en-US\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Users\Default User\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4532
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5b0464a68d3df95ccb9023830b6a2037c
SHA196a229ed8d9b3d26086fa10c9675203b4f5f4626
SHA25611271bb4ead40385c854e9a19eef0d64578639066195361a5e4818d172f5bbfb
SHA51202a80deec6b8089da6102c9763f39bb6d3d0bbee340a44f04f13226e4d8c69ae699076f7ef6eeeeb9e705bc1b7fe8c02399682ef52754ecfec09f4799345179f
-
Filesize
212B
MD567d79bce69c229cbc124218b22fb85a9
SHA1b33a2c6901cd0d99995e59f052d1441043d19834
SHA2567f8c24e0d198f241abc1a249a0346bb2c78a1af6731bf45faaf16f8580e4e726
SHA512bbfa08a3eafe1167d26626f41a07827b991010092aa33fe305a3935b73565185ee874a6f15249839f992ee48d74a8a2bbea5f1636650432c3b536cb6250dc437