Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 02:38
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe
-
Size
2.9MB
-
MD5
b99a438bb5300f4aee538098b882cdf8
-
SHA1
560f538147a4ca5e6bfeadb3ef48ccde7070120c
-
SHA256
89c098f195e0becb85dbdba2a1f03a2a69081dc6c6364c3c0d4cef5cafc5bab2
-
SHA512
4ef448045f7e16cacf9ec86a70b9be823f766386bd10b2d0550d1d49a21a0a60907a9c3d8c2bbd2dc87024789d6da28f45cd018d7e52623791eccde9f6a21f84
-
SSDEEP
49152:7wefjxPCEjdphA8ZLUj+khAHYevjm7rDeqYQjmCYi78jFA:7zqCA85UuHYeLu0PCYi78q
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4888 3600 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 916 3600 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2512 3600 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 212 3600 schtasks.exe 83 -
resource yara_rule behavioral2/memory/4248-1-0x0000000000810000-0x0000000000E58000-memory.dmp dcrat behavioral2/memory/4248-2-0x0000000000810000-0x0000000000E58000-memory.dmp dcrat behavioral2/memory/4248-21-0x0000000000810000-0x0000000000E58000-memory.dmp dcrat behavioral2/memory/4524-26-0x00000000007D0000-0x0000000000E18000-memory.dmp dcrat behavioral2/memory/4524-27-0x00000000007D0000-0x0000000000E18000-memory.dmp dcrat behavioral2/memory/4524-31-0x00000000007D0000-0x0000000000E18000-memory.dmp dcrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SearchApp.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SearchApp.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe -
Executes dropped EXE 1 IoCs
pid Process 4524 SearchApp.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine SearchApp.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\ComputerDefaults\\dllhost.exe\"" JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\mfc120jpn\\RuntimeBroker.exe\"" JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sihost = "\"C:\\Windows\\System32\\gpedit\\sihost.exe\"" JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\DefaultSettings\\SearchApp.exe\"" JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\ComputerDefaults\dllhost.exe JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe File created C:\Windows\SysWOW64\ComputerDefaults\5940a34987c99120d96dace90a3f93f329dcad63 JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe File created C:\Windows\SysWOW64\mfc120jpn\RuntimeBroker.exe JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe File created C:\Windows\SysWOW64\mfc120jpn\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe File created C:\Windows\SysWOW64\gpedit\sihost.exe JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe File created C:\Windows\SysWOW64\gpedit\66fc9ff0ee96c2b21f0cfded48750ae9e3032bf3 JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4248 JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe 4524 SearchApp.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\DefaultSettings\SearchApp.exe JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\DefaultSettings\SearchApp.exe JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\DefaultSettings\38384e6a620884a6b69bcc56f80d556f9200171c JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w32tm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SearchApp.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 212 schtasks.exe 4888 schtasks.exe 916 schtasks.exe 2512 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4248 JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe 4248 JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe 4248 JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe 4524 SearchApp.exe 4524 SearchApp.exe 4524 SearchApp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4248 JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe Token: SeDebugPrivilege 4524 SearchApp.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4248 wrote to memory of 4656 4248 JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe 88 PID 4248 wrote to memory of 4656 4248 JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe 88 PID 4248 wrote to memory of 4656 4248 JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe 88 PID 4656 wrote to memory of 788 4656 cmd.exe 90 PID 4656 wrote to memory of 788 4656 cmd.exe 90 PID 4656 wrote to memory of 788 4656 cmd.exe 90 PID 788 wrote to memory of 4780 788 w32tm.exe 91 PID 788 wrote to memory of 4780 788 w32tm.exe 91 PID 4656 wrote to memory of 4524 4656 cmd.exe 98 PID 4656 wrote to memory of 4524 4656 cmd.exe 98 PID 4656 wrote to memory of 4524 4656 cmd.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b99a438bb5300f4aee538098b882cdf8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\F0hfuQpFdc.bat"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵PID:4780
-
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\DefaultSettings\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\DefaultSettings\SearchApp.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\DefaultSettings\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\ComputerDefaults\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\mfc120jpn\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Windows\System32\gpedit\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:212
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254B
MD5de9afbf7faa20be1018bd42403def627
SHA1978eace5b5c91cef4090e548a0d981c92b891575
SHA256d98ad92718350fc631bee523544970ca3362b06cbe084ec2338af295e3a1a382
SHA5121a02764741c8e8354e53efacdc8546ffc20a107053450f070804ac882168d1e30ba2a17ad3376c324be814382b17975c4ff60ab103da9aff50fa7911ac4e77bd
-
Filesize
2.9MB
MD5b99a438bb5300f4aee538098b882cdf8
SHA1560f538147a4ca5e6bfeadb3ef48ccde7070120c
SHA25689c098f195e0becb85dbdba2a1f03a2a69081dc6c6364c3c0d4cef5cafc5bab2
SHA5124ef448045f7e16cacf9ec86a70b9be823f766386bd10b2d0550d1d49a21a0a60907a9c3d8c2bbd2dc87024789d6da28f45cd018d7e52623791eccde9f6a21f84