Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 02:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe
-
Size
1.9MB
-
MD5
f4d16e7236887920d01ac59230bc6cf7
-
SHA1
d3d6623b885d39afd92e419b0aa1d9109f30ae6e
-
SHA256
0d926f7f14556e0fcbf2bf4af5df95dd23f8dd855ef09fe3f1dd6b8978d26488
-
SHA512
cff90485e960e4d23b4aa15407b2782a1c08bcb25951fdf38bd5c3f459fc572eaaa332e8e447bd7a0a9d4feb45a7e26b64a2079f573d70de65a3bb27ed89adfb
-
SSDEEP
24576:8VkS8Eqm8sChfmkqR7lc4COVpW4TicTasT5Wxqyi0JJhAxsJD7so7cdmhm0cpfKp:8Vk+L88YZOVv3hdkqN08sJzc9V6P2U
Malware Config
Signatures
-
DcRat 17 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 3140 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Windows\\splwow64\\explorer.exe\"" JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Windows\\regedit\\sysmon.exe\"" JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 3152 schtasks.exe 2540 schtasks.exe 2988 schtasks.exe 1804 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 4004 schtasks.exe 1244 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\System32\\MSAC3ENC\\spoolsv.exe\"" JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 3288 schtasks.exe 3996 schtasks.exe 1692 schtasks.exe 3568 schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Windows\\PolicyDefinitions\\ja-JP\\SearchApp.exe\"" JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe -
Dcrat family
-
Process spawned unexpected child process 11 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3140 1416 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3152 1416 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4004 1416 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3288 1416 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3996 1416 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2540 1416 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2988 1416 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1244 1416 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1804 1416 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1692 1416 schtasks.exe 84 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3568 1416 schtasks.exe 84 -
resource yara_rule behavioral2/memory/32-1-0x0000000000700000-0x0000000000BF6000-memory.dmp dcrat behavioral2/memory/32-2-0x0000000000700000-0x0000000000BF6000-memory.dmp dcrat behavioral2/memory/32-23-0x0000000000700000-0x0000000000BF6000-memory.dmp dcrat behavioral2/memory/2332-26-0x0000000000700000-0x0000000000BF6000-memory.dmp dcrat behavioral2/memory/2332-27-0x0000000000700000-0x0000000000BF6000-memory.dmp dcrat behavioral2/memory/2332-46-0x0000000000700000-0x0000000000BF6000-memory.dmp dcrat behavioral2/memory/2976-51-0x0000000000950000-0x0000000000E46000-memory.dmp dcrat behavioral2/memory/2976-52-0x0000000000950000-0x0000000000E46000-memory.dmp dcrat behavioral2/memory/2976-63-0x0000000000950000-0x0000000000E46000-memory.dmp dcrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ OfficeClickToRun.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion OfficeClickToRun.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe -
Executes dropped EXE 1 IoCs
pid Process 2976 OfficeClickToRun.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine OfficeClickToRun.exe -
Adds Run key to start application 2 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\System32\\MSAC3ENC\\spoolsv.exe\"" JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OfficeClickToRun = "\"C:\\Users\\Default User\\OfficeClickToRun.exe\"" JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Documents and Settings\\services.exe\"" JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Windows\\PolicyDefinitions\\ja-JP\\SearchApp.exe\"" JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sysmon = "\"C:\\Windows\\regedit\\sysmon.exe\"" JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Recovery\\WindowsRE\\RuntimeBroker.exe\"" JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Windows\\splwow64\\explorer.exe\"" JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\upfc = "\"C:\\ProgramData\\Package Cache\\{79043ED0-7ED1-4227-A5E5-04C5594D21F7}v48.108.8828\\upfc.exe\"" JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\System32\\tttracer\\spoolsv.exe\"" JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\IME\\uk-UA\\WmiPrvSE.exe\"" JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\PresentationHost\\RuntimeBroker.exe\"" JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\MSAC3ENC\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe File created C:\Windows\SysWOW64\tttracer\spoolsv.exe JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe File created C:\Windows\SysWOW64\tttracer\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe File created C:\Windows\SysWOW64\PresentationHost\RuntimeBroker.exe JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe File created C:\Windows\SysWOW64\PresentationHost\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe File created C:\Windows\SysWOW64\MSAC3ENC\spoolsv.exe JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe File opened for modification C:\Windows\SysWOW64\MSAC3ENC\spoolsv.exe JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 32 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 2332 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 2976 OfficeClickToRun.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\PolicyDefinitions\ja-JP\38384e6a620884a6b69bcc56f80d556f9200171c JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe File created C:\Windows\regedit\sysmon.exe JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe File created C:\Windows\regedit\121e5b5079f7c0e46d90f99b3864022518bbbda9 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe File created C:\Windows\splwow64\explorer.exe JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe File created C:\Windows\splwow64\7a0fd90576e08807bde2cc57bcf9854bbce05fe3 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe File created C:\Windows\IME\uk-UA\WmiPrvSE.exe JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe File created C:\Windows\IME\uk-UA\24dbde2999530ef5fd907494bc374d663924116c JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe File created C:\Windows\PolicyDefinitions\ja-JP\SearchApp.exe JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OfficeClickToRun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w32tm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w32tm.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3152 schtasks.exe 3996 schtasks.exe 2540 schtasks.exe 2988 schtasks.exe 1804 schtasks.exe 1692 schtasks.exe 3140 schtasks.exe 4004 schtasks.exe 3288 schtasks.exe 1244 schtasks.exe 3568 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 32 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 32 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 32 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 32 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 32 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 2332 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 2332 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 2332 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 2976 OfficeClickToRun.exe 2976 OfficeClickToRun.exe 2976 OfficeClickToRun.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 32 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Token: SeDebugPrivilege 2332 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe Token: SeDebugPrivilege 2976 OfficeClickToRun.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 32 wrote to memory of 1328 32 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 90 PID 32 wrote to memory of 1328 32 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 90 PID 32 wrote to memory of 1328 32 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 90 PID 1328 wrote to memory of 4056 1328 cmd.exe 92 PID 1328 wrote to memory of 4056 1328 cmd.exe 92 PID 1328 wrote to memory of 4056 1328 cmd.exe 92 PID 4056 wrote to memory of 2116 4056 w32tm.exe 93 PID 4056 wrote to memory of 2116 4056 w32tm.exe 93 PID 1328 wrote to memory of 2332 1328 cmd.exe 94 PID 1328 wrote to memory of 2332 1328 cmd.exe 94 PID 1328 wrote to memory of 2332 1328 cmd.exe 94 PID 2332 wrote to memory of 2716 2332 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 101 PID 2332 wrote to memory of 2716 2332 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 101 PID 2332 wrote to memory of 2716 2332 JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe 101 PID 2716 wrote to memory of 448 2716 cmd.exe 103 PID 2716 wrote to memory of 448 2716 cmd.exe 103 PID 2716 wrote to memory of 448 2716 cmd.exe 103 PID 448 wrote to memory of 2324 448 w32tm.exe 104 PID 448 wrote to memory of 2324 448 w32tm.exe 104 PID 2716 wrote to memory of 2976 2716 cmd.exe 109 PID 2716 wrote to memory of 2976 2716 cmd.exe 109 PID 2716 wrote to memory of 2976 2716 cmd.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe"1⤵
- DcRat
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\gEII4JvH6p.bat"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵PID:2116
-
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RkOdXAZlJg.bat"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:2324
-
-
-
C:\Users\Default User\OfficeClickToRun.exe"C:\Users\Default User\OfficeClickToRun.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\MSAC3ENC\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\PolicyDefinitions\ja-JP\SearchApp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3152
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\regedit\sysmon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\splwow64\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\ProgramData\Package Cache\{79043ED0-7ED1-4227-A5E5-04C5594D21F7}v48.108.8828\upfc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\tttracer\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Default User\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Documents and Settings\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\IME\uk-UA\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\PresentationHost\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3568
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\JaffaCakes118_f4d16e7236887920d01ac59230bc6cf7.exe.log
Filesize1KB
MD5f5e93a467b0f78f860ff2ba798c5fd2c
SHA1462b6677af76647b0c08fe91d019cb29d364f616
SHA256fa2d2b185ce7cfa214b0c9a8b26c9d30ac325c924434f957c2f3e0bb74a749cf
SHA512b50b1a0aeff65a77574897654ace4a3b518e5f9192c74e516c84ff6796e52ad811c23caa1ac7d52449601a1004c9cc3a734c3a10a94d67750eb771ca0a7f2e25
-
Filesize
206B
MD55c12b809b0d865da9bd6bf9045033e2b
SHA1283abcce62a71f9a4cfd20b24704e6ac400743ca
SHA2565c4a452611868c6f33787d125f04e684cc9bf9357b4f2c64d7bf22c954696824
SHA51266cd974397575e26f395a33ff388b960a56f00f3bb8db6f13280596d7efae388083d06a21fd24881cd518f0a200692c74e47243a00d00a434b9734bd00ce6073
-
Filesize
248B
MD5f0d0302e05afbdecc3a430b073b7bc6d
SHA1a811c4cac25a184e2ade9a64d251dee278f30df6
SHA256e6b60a9597e54920abbbf1f2e98939d03266ef62a4e1ad73c2e86f826b89e614
SHA5122d7e2b6b64c4ebd8e1f193d1ac0968e06f712c17cf0120f708bebffb120ddeee3c3e08c9334785b8e64e2553754cbc56454c380a5bc53c70c15695dc49d88ccc
-
Filesize
1.9MB
MD5f4d16e7236887920d01ac59230bc6cf7
SHA1d3d6623b885d39afd92e419b0aa1d9109f30ae6e
SHA2560d926f7f14556e0fcbf2bf4af5df95dd23f8dd855ef09fe3f1dd6b8978d26488
SHA512cff90485e960e4d23b4aa15407b2782a1c08bcb25951fdf38bd5c3f459fc572eaaa332e8e447bd7a0a9d4feb45a7e26b64a2079f573d70de65a3bb27ed89adfb