Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 04:03
Behavioral task
behavioral1
Sample
JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe
-
Size
1.2MB
-
MD5
f67e9c9915e81bd08ebb0e2b57909677
-
SHA1
9fd3f0658a7c285d6bdcd6f5b25d3995045a5b88
-
SHA256
45790bd0bb5eef4380c93de089dd9bf9b137a70bdc2f78e976919b6dd4b6bb2b
-
SHA512
c71df4adc7b5bc534b74a25e2b7aadefb1ca0e6c8d9380785f4012bb0974df8f382a8fa3ba21ca8f91a3cbc338821fc7f7e5d3d7ab9e1b2b4ce1e0e4d1fec0fe
-
SSDEEP
24576:B2G/nvxW3W0nme0wCtsOkpS8BUvLlR5RevPxsJT2xdHM+4b:BbA3Huw/H08qRqvJsJTkH+
Malware Config
Signatures
-
DcRat 11 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 1688 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe 3040 schtasks.exe 2872 schtasks.exe 2692 schtasks.exe 2552 schtasks.exe 1864 schtasks.exe 1728 schtasks.exe 2756 schtasks.exe 2028 schtasks.exe 1944 schtasks.exe -
Dcrat family
-
Process spawned unexpected child process 10 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3040 2816 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2872 2816 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2692 2816 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2552 2816 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1728 2816 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1864 2816 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2756 2816 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2028 2816 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1688 2816 schtasks.exe 35 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1944 2816 schtasks.exe 35 -
resource yara_rule behavioral1/files/0x0008000000018bdd-12.dat dcrat behavioral1/memory/2968-13-0x0000000000C00000-0x0000000000CEA000-memory.dmp dcrat behavioral1/memory/1992-28-0x0000000000040000-0x000000000012A000-memory.dmp dcrat behavioral1/memory/1692-47-0x00000000009B0000-0x0000000000A9A000-memory.dmp dcrat -
Executes dropped EXE 3 IoCs
pid Process 2968 WinsessionBrokernetIntohost.exe 1992 WinsessionBrokernetIntohost.exe 1692 dllhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2828 cmd.exe 2828 cmd.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Windows\\System32\\wisptis\\sppsvc.exe\"" WinsessionBrokernetIntohost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\services = "\"C:\\Windows\\System32\\qprocess\\services.exe\"" WinsessionBrokernetIntohost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\1033\\dllhost.exe\"" WinsessionBrokernetIntohost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\System32\\wbem\\portabledeviceapi\\WmiPrvSE.exe\"" WinsessionBrokernetIntohost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\System32\\rasphone\\spoolsv.exe\"" WinsessionBrokernetIntohost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Idle = "\"C:\\MSOCache\\All Users\\{90140000-0116-0409-1000-0000000FF1CE}-C\\Idle.exe\"" WinsessionBrokernetIntohost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files (x86)\\Microsoft Sync Framework\\v1.0\\Runtime\\x86\\explorer.exe\"" WinsessionBrokernetIntohost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Users\\Default\\Links\\smss.exe\"" WinsessionBrokernetIntohost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\System32\\wbem\\sppwmi\\WmiPrvSE.exe\"" WinsessionBrokernetIntohost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Windows\\System32\\wbem\\wmipdskq\\WmiPrvSE.exe\"" WinsessionBrokernetIntohost.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\System32\wisptis\sppsvc.exe WinsessionBrokernetIntohost.exe File created C:\Windows\System32\wbem\sppwmi\24dbde2999530ef5fd907494bc374d663924116c WinsessionBrokernetIntohost.exe File opened for modification C:\Windows\System32\wbem\wmipdskq\WmiPrvSE.exe WinsessionBrokernetIntohost.exe File opened for modification C:\Windows\System32\wisptis\sppsvc.exe WinsessionBrokernetIntohost.exe File created C:\Windows\System32\wbem\sppwmi\WmiPrvSE.exe WinsessionBrokernetIntohost.exe File created C:\Windows\System32\wbem\wmipdskq\WmiPrvSE.exe WinsessionBrokernetIntohost.exe File created C:\Windows\System32\rasphone\spoolsv.exe WinsessionBrokernetIntohost.exe File created C:\Windows\System32\wbem\portabledeviceapi\24dbde2999530ef5fd907494bc374d663924116c WinsessionBrokernetIntohost.exe File created C:\Windows\System32\rasphone\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4 WinsessionBrokernetIntohost.exe File created C:\Windows\System32\wisptis\0a1fd5f707cd16ea89afd3d6db52b2da58214a6c WinsessionBrokernetIntohost.exe File created C:\Windows\System32\wbem\wmipdskq\24dbde2999530ef5fd907494bc374d663924116c WinsessionBrokernetIntohost.exe File created C:\Windows\System32\qprocess\services.exe WinsessionBrokernetIntohost.exe File created C:\Windows\System32\qprocess\c5b4cb5e9653cce737f29f72ba880dd4c4bab27d WinsessionBrokernetIntohost.exe File created C:\Windows\System32\wbem\portabledeviceapi\WmiPrvSE.exe WinsessionBrokernetIntohost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\explorer.exe WinsessionBrokernetIntohost.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\7a0fd90576e08807bde2cc57bcf9854bbce05fe3 WinsessionBrokernetIntohost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3040 schtasks.exe 2872 schtasks.exe 2692 schtasks.exe 1864 schtasks.exe 2756 schtasks.exe 1688 schtasks.exe 2552 schtasks.exe 1728 schtasks.exe 2028 schtasks.exe 1944 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2968 WinsessionBrokernetIntohost.exe 1992 WinsessionBrokernetIntohost.exe 1692 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2968 WinsessionBrokernetIntohost.exe Token: SeDebugPrivilege 1992 WinsessionBrokernetIntohost.exe Token: SeDebugPrivilege 1692 dllhost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2352 2636 JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe 30 PID 2636 wrote to memory of 2352 2636 JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe 30 PID 2636 wrote to memory of 2352 2636 JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe 30 PID 2636 wrote to memory of 2352 2636 JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe 30 PID 2352 wrote to memory of 2828 2352 WScript.exe 32 PID 2352 wrote to memory of 2828 2352 WScript.exe 32 PID 2352 wrote to memory of 2828 2352 WScript.exe 32 PID 2352 wrote to memory of 2828 2352 WScript.exe 32 PID 2828 wrote to memory of 2968 2828 cmd.exe 34 PID 2828 wrote to memory of 2968 2828 cmd.exe 34 PID 2828 wrote to memory of 2968 2828 cmd.exe 34 PID 2828 wrote to memory of 2968 2828 cmd.exe 34 PID 2968 wrote to memory of 2340 2968 WinsessionBrokernetIntohost.exe 40 PID 2968 wrote to memory of 2340 2968 WinsessionBrokernetIntohost.exe 40 PID 2968 wrote to memory of 2340 2968 WinsessionBrokernetIntohost.exe 40 PID 2340 wrote to memory of 656 2340 cmd.exe 42 PID 2340 wrote to memory of 656 2340 cmd.exe 42 PID 2340 wrote to memory of 656 2340 cmd.exe 42 PID 2340 wrote to memory of 1992 2340 cmd.exe 43 PID 2340 wrote to memory of 1992 2340 cmd.exe 43 PID 2340 wrote to memory of 1992 2340 cmd.exe 43 PID 1992 wrote to memory of 1692 1992 WinsessionBrokernetIntohost.exe 50 PID 1992 wrote to memory of 1692 1992 WinsessionBrokernetIntohost.exe 50 PID 1992 wrote to memory of 1692 1992 WinsessionBrokernetIntohost.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe"1⤵
- DcRat
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\WinsessionBrokernet\ufqa67DL2gtzgC.vbe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\WinsessionBrokernet\vxdOo.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Roaming\WinsessionBrokernet\WinsessionBrokernetIntohost.exe"C:\Users\Admin\AppData\Roaming\WinsessionBrokernet\WinsessionBrokernetIntohost.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\j3gTZGu6ZK.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:656
-
-
C:\Users\Admin\AppData\Roaming\WinsessionBrokernet\WinsessionBrokernetIntohost.exe"C:\Users\Admin\AppData\Roaming\WinsessionBrokernet\WinsessionBrokernetIntohost.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\dllhost.exe"C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\dllhost.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\System32\wisptis\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\explorer.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Default\Links\smss.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\sppwmi\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\wmipdskq\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\System32\qprocess\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1864
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\System32\wbem\portabledeviceapi\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\rasphone\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\Idle.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1944
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
246B
MD5f43da31abfb27dc3de296834872e30be
SHA1bc3e31b3b8b98fc6b145ce32dd09808cad59b24a
SHA2566db173c8a3a08d5ad17ebae842068c9bfd419df78c5926f345d75ea46b36c04d
SHA51242b3fd68a97a9f89b26b60f707db5274041322ceb3e78630cce7edd67103cf8790845278f32b63dcac134a2de1939e753dd55e16f7536a02b04b6f7712cb9b24
-
Filesize
910KB
MD53c0e66c07059d17b9dec156ae1f99fcf
SHA1a9cf63368c43a839590f55a4896d503909d4ea76
SHA256bd10ea4eeb2a7f1e9b3157ce51752336fe3d6dc56fb49bdc736bbe0ea34f5936
SHA5124a7d7555e6cf982c62fe7185f7b147c959a82b3be5e33aeec7bc9f22ab8adcdf4cf9ca10a2a7be50a7f98c19402f8bde9fff22ff8de3e3727a8a35604767ab39
-
Filesize
208B
MD579ec3118b469d48b8b3b6a1c0b330fb5
SHA19ef874c6a1ca3af5e07e83260dee0dc6ff7e3816
SHA256b3bbe75c2eed62015193612b19c38eabb1c7a7b51797ad9ffa26b1eb7485839f
SHA5120d085322c07d4553cbe7303a1a88ec329845a25ba07efe83989f912ab4e311f7ef891c2c071e87adb2de2b8b2c4e4ef5a2673b02ad8b45444e6663ead1fd0580
-
Filesize
63B
MD5ea5bc8528b06faf92eaa4f0d6194365b
SHA1734509caf332eeffcdfea6d079b45653876e221d
SHA256e1d8b03b08fd259e5a9cda84dc3f646bd68701ae82586e48072b62107dfb0f7a
SHA51211cc2fd1bd98468908a197944fbd133c23899284fb745159b140d9e1f477d8c96a03c167a229814089fdc31ceed18d32992f05dd96369cbed290b3004d298edb