Analysis
-
max time kernel
93s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 13:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe
-
Size
3.3MB
-
MD5
c95ac454cf5cab75cd487ccb82ee5d2a
-
SHA1
5098362ca55b5c1b4e22685f5a3fd7d2752df2e9
-
SHA256
91704a8d50393554e16e3cb1c4323a1ac3fd69ec86c503f86cf2736965abea3b
-
SHA512
782cb16c300eb5dad7862772aa6072224884349f64de5e876ce59bd2d7cf6ecaf4ffd096c3fb825404821394538f6950990c19b26182cdd4ef29f2bed331f8ce
-
SSDEEP
98304:jLozdB/qu2Ae/tYgFgYYU9xA+X6PwBZ9McLu:vozdYBYU9UwBZDu
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 8 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3180 3940 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1320 3940 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3936 3940 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 624 3940 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 3940 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4360 3940 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4248 3940 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1800 3940 schtasks.exe 83 -
resource yara_rule behavioral2/memory/2148-2-0x0000000000E30000-0x0000000001628000-memory.dmp dcrat behavioral2/memory/2148-3-0x0000000000E30000-0x0000000001628000-memory.dmp dcrat behavioral2/memory/2148-31-0x0000000000E30000-0x0000000001628000-memory.dmp dcrat behavioral2/memory/1916-37-0x0000000000330000-0x0000000000B28000-memory.dmp dcrat behavioral2/memory/1916-38-0x0000000000330000-0x0000000000B28000-memory.dmp dcrat behavioral2/memory/1916-55-0x0000000000330000-0x0000000000B28000-memory.dmp dcrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostw.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe -
Executes dropped EXE 1 IoCs
pid Process 1916 taskhostw.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine taskhostw.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\PerfLogs\\taskhostw.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\PerfLogs\\System.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Program Files\\Common Files\\microsoft shared\\ClickToRun\\api-ms-win-crt-math-l1-1-0\\OfficeClickToRun.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\KBDA1\\dllhost.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Windows\\System32\\cryptdlg\\SppExtComObj.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\SearchApi\\SearchApp.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\System32\\catsrvps\\fontdrvhost.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TextInputHost = "\"C:\\Documents and Settings\\TextInputHost.exe\"" JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File opened for modification \??\PhysicalDrive0 taskhostw.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\KBDA1\dllhost.exe JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File created C:\Windows\SysWOW64\KBDA1\5940a34987c99120d96dace90a3f93f329dcad63 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File created C:\Windows\SysWOW64\cryptdlg\SppExtComObj.exe JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File created C:\Windows\SysWOW64\cryptdlg\e1ef82546f0b02b7e974f28047f3788b1128cce1 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File created C:\Windows\SysWOW64\catsrvps\fontdrvhost.exe JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File created C:\Windows\SysWOW64\catsrvps\5b884080fd4f94e2695da25c503f9e33b9605b83 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2148 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 1916 taskhostw.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-math-l1-1-0\OfficeClickToRun.exe JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-math-l1-1-0\OfficeClickToRun.exe JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-math-l1-1-0\e6c9b481da804f07baff8eff543b0a1441069b5d JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi\SearchApp.exe JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi\38384e6a620884a6b69bcc56f80d556f9200171c JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w32tm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhostw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4360 schtasks.exe 4248 schtasks.exe 1800 schtasks.exe 3180 schtasks.exe 1320 schtasks.exe 3936 schtasks.exe 624 schtasks.exe 1740 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2148 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 2148 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 2148 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 2148 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 2148 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe 1916 taskhostw.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2148 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe Token: SeDebugPrivilege 1916 taskhostw.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2148 wrote to memory of 4988 2148 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 95 PID 2148 wrote to memory of 4988 2148 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 95 PID 2148 wrote to memory of 4988 2148 JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe 95 PID 4988 wrote to memory of 1568 4988 cmd.exe 97 PID 4988 wrote to memory of 1568 4988 cmd.exe 97 PID 4988 wrote to memory of 1568 4988 cmd.exe 97 PID 1568 wrote to memory of 3080 1568 w32tm.exe 98 PID 1568 wrote to memory of 3080 1568 w32tm.exe 98 PID 4988 wrote to memory of 1916 4988 cmd.exe 105 PID 4988 wrote to memory of 1916 4988 cmd.exe 105 PID 4988 wrote to memory of 1916 4988 cmd.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c95ac454cf5cab75cd487ccb82ee5d2a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bga9htg3wu.bat"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵PID:3080
-
-
-
C:\PerfLogs\taskhostw.exe"C:\PerfLogs\taskhostw.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-math-l1-1-0\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\KBDA1\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1320
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\System32\cryptdlg\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System32\catsrvps\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Documents and Settings\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\PerfLogs\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\PerfLogs\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1800
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5f08fafc6e9da6af1aa9a2f3814c5f900
SHA17f7630cbdaed1d187655a901c988e85d923ee8d3
SHA256f65f6f16daef6659c359934a2307c8a75a180aec06c0fe6bb35bdca4cbf44227
SHA512f1dafc7a72bcb3b1e4247be67e0b3d67dfff59a494d17a4501a620dec3cbefee694e02408e483a06cb81dd36369493e755c9d4d06240f1d7059a97dc7c29820c
-
Filesize
189B
MD5e09ef3f5bc79157841aab3c69e8f8710
SHA1edfecde7af341fc0f9c136adda591afa691e600c
SHA256d6a1b1d718babb8b3f26d929323981931199404d32162adc04f02f57d4495ec7
SHA51217bca50a8069316f61e9857f10eba51487f873bc1f27f1d1d70ad715be3ad8b097c10275a8d393b3e1c40569e2ee86b4ffb87b00d14fc95956d3d49466ba5403
-
Filesize
3.3MB
MD5c95ac454cf5cab75cd487ccb82ee5d2a
SHA15098362ca55b5c1b4e22685f5a3fd7d2752df2e9
SHA25691704a8d50393554e16e3cb1c4323a1ac3fd69ec86c503f86cf2736965abea3b
SHA512782cb16c300eb5dad7862772aa6072224884349f64de5e876ce59bd2d7cf6ecaf4ffd096c3fb825404821394538f6950990c19b26182cdd4ef29f2bed331f8ce