Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2025 02:38

General

  • Target

    JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe

  • Size

    2.9MB

  • MD5

    b99a438bb5300f4aee538098b882cdf8

  • SHA1

    560f538147a4ca5e6bfeadb3ef48ccde7070120c

  • SHA256

    89c098f195e0becb85dbdba2a1f03a2a69081dc6c6364c3c0d4cef5cafc5bab2

  • SHA512

    4ef448045f7e16cacf9ec86a70b9be823f766386bd10b2d0550d1d49a21a0a60907a9c3d8c2bbd2dc87024789d6da28f45cd018d7e52623791eccde9f6a21f84

  • SSDEEP

    49152:7wefjxPCEjdphA8ZLUj+khAHYevjm7rDeqYQjmCYi78jFA:7zqCA85UuHYeLu0PCYi78q

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 4 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4248
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\F0hfuQpFdc.bat"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4656
      • C:\Windows\SysWOW64\w32tm.exe
        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:788
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          4⤵
            PID:4780
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\DefaultSettings\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\DefaultSettings\SearchApp.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4524
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\DefaultSettings\SearchApp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:4888
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\ComputerDefaults\dllhost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:916
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\mfc120jpn\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:2512
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\System32\gpedit\sihost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Scheduled Task/Job: Scheduled Task
      PID:212

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\F0hfuQpFdc.bat

      Filesize

      254B

      MD5

      de9afbf7faa20be1018bd42403def627

      SHA1

      978eace5b5c91cef4090e548a0d981c92b891575

      SHA256

      d98ad92718350fc631bee523544970ca3362b06cbe084ec2338af295e3a1a382

      SHA512

      1a02764741c8e8354e53efacdc8546ffc20a107053450f070804ac882168d1e30ba2a17ad3376c324be814382b17975c4ff60ab103da9aff50fa7911ac4e77bd

    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\DefaultSettings\SearchApp.exe

      Filesize

      2.9MB

      MD5

      b99a438bb5300f4aee538098b882cdf8

      SHA1

      560f538147a4ca5e6bfeadb3ef48ccde7070120c

      SHA256

      89c098f195e0becb85dbdba2a1f03a2a69081dc6c6364c3c0d4cef5cafc5bab2

      SHA512

      4ef448045f7e16cacf9ec86a70b9be823f766386bd10b2d0550d1d49a21a0a60907a9c3d8c2bbd2dc87024789d6da28f45cd018d7e52623791eccde9f6a21f84

    • memory/4248-3-0x0000000007FD0000-0x0000000008574000-memory.dmp

      Filesize

      5.6MB

    • memory/4248-0-0x0000000000810000-0x0000000000E58000-memory.dmp

      Filesize

      6.3MB

    • memory/4248-4-0x0000000007950000-0x00000000079EC000-memory.dmp

      Filesize

      624KB

    • memory/4248-7-0x0000000007A20000-0x0000000007A86000-memory.dmp

      Filesize

      408KB

    • memory/4248-2-0x0000000000810000-0x0000000000E58000-memory.dmp

      Filesize

      6.3MB

    • memory/4248-21-0x0000000000810000-0x0000000000E58000-memory.dmp

      Filesize

      6.3MB

    • memory/4248-1-0x0000000000810000-0x0000000000E58000-memory.dmp

      Filesize

      6.3MB

    • memory/4524-24-0x00000000007D0000-0x0000000000E18000-memory.dmp

      Filesize

      6.3MB

    • memory/4524-26-0x00000000007D0000-0x0000000000E18000-memory.dmp

      Filesize

      6.3MB

    • memory/4524-27-0x00000000007D0000-0x0000000000E18000-memory.dmp

      Filesize

      6.3MB

    • memory/4524-28-0x0000000005580000-0x000000000558E000-memory.dmp

      Filesize

      56KB

    • memory/4524-31-0x00000000007D0000-0x0000000000E18000-memory.dmp

      Filesize

      6.3MB