Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 04:03
Behavioral task
behavioral1
Sample
JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe
-
Size
1.2MB
-
MD5
f67e9c9915e81bd08ebb0e2b57909677
-
SHA1
9fd3f0658a7c285d6bdcd6f5b25d3995045a5b88
-
SHA256
45790bd0bb5eef4380c93de089dd9bf9b137a70bdc2f78e976919b6dd4b6bb2b
-
SHA512
c71df4adc7b5bc534b74a25e2b7aadefb1ca0e6c8d9380785f4012bb0974df8f382a8fa3ba21ca8f91a3cbc338821fc7f7e5d3d7ab9e1b2b4ce1e0e4d1fec0fe
-
SSDEEP
24576:B2G/nvxW3W0nme0wCtsOkpS8BUvLlR5RevPxsJT2xdHM+4b:BbA3Huw/H08qRqvJsJTkH+
Malware Config
Signatures
-
DcRat 9 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 1956 schtasks.exe 4800 schtasks.exe 2752 schtasks.exe 64 schtasks.exe 3504 schtasks.exe 3488 schtasks.exe 4520 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe 2288 schtasks.exe -
Dcrat family
-
Process spawned unexpected child process 8 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2288 2524 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2752 2524 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 64 2524 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1956 2524 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4800 2524 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3504 2524 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3488 2524 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4520 2524 schtasks.exe 89 -
resource yara_rule behavioral2/files/0x000a000000023b69-10.dat dcrat behavioral2/memory/1344-13-0x0000000000B00000-0x0000000000BEA000-memory.dmp dcrat -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation WinsessionBrokernetIntohost.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 1344 WinsessionBrokernetIntohost.exe 1508 dwm.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\System32\\BdeHdCfgLib\\RuntimeBroker.exe\"" WinsessionBrokernetIntohost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\Windows.UI.Xaml.Resources.win8rtm\\dwm.exe\"" WinsessionBrokernetIntohost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\conhost = "\"C:\\Documents and Settings\\conhost.exe\"" WinsessionBrokernetIntohost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\InputHost\\dwm.exe\"" WinsessionBrokernetIntohost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\Users\\Default\\Favorites\\WmiPrvSE.exe\"" WinsessionBrokernetIntohost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Windows\\System32\\cmstp\\fontdrvhost.exe\"" WinsessionBrokernetIntohost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\System32\\TrustedSignalCredProv\\spoolsv.exe\"" WinsessionBrokernetIntohost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinsessionBrokernetIntohost = "\"C:\\Windows\\IME\\WinsessionBrokernetIntohost.exe\"" WinsessionBrokernetIntohost.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\System32\cmstp\fontdrvhost.exe WinsessionBrokernetIntohost.exe File created C:\Windows\System32\cmstp\5b884080fd4f94e2695da25c503f9e33b9605b83 WinsessionBrokernetIntohost.exe File created C:\Windows\System32\Windows.UI.Xaml.Resources.win8rtm\6cb0b6c459d5d3455a3da700e713f2e2529862ff WinsessionBrokernetIntohost.exe File created C:\Windows\System32\InputHost\dwm.exe WinsessionBrokernetIntohost.exe File created C:\Windows\System32\InputHost\6cb0b6c459d5d3455a3da700e713f2e2529862ff WinsessionBrokernetIntohost.exe File created C:\Windows\System32\TrustedSignalCredProv\spoolsv.exe WinsessionBrokernetIntohost.exe File created C:\Windows\System32\TrustedSignalCredProv\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4 WinsessionBrokernetIntohost.exe File created C:\Windows\System32\BdeHdCfgLib\RuntimeBroker.exe WinsessionBrokernetIntohost.exe File created C:\Windows\System32\BdeHdCfgLib\9e8d7a4ca61bd92aff00cc37a7a4d62a2cac998d WinsessionBrokernetIntohost.exe File created C:\Windows\System32\Windows.UI.Xaml.Resources.win8rtm\dwm.exe WinsessionBrokernetIntohost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\IME\WinsessionBrokernetIntohost.exe WinsessionBrokernetIntohost.exe File opened for modification C:\Windows\IME\WinsessionBrokernetIntohost.exe WinsessionBrokernetIntohost.exe File created C:\Windows\IME\6802d49560e6967b6f231d6e1692a9775cc05560 WinsessionBrokernetIntohost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings WinsessionBrokernetIntohost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2288 schtasks.exe 2752 schtasks.exe 64 schtasks.exe 1956 schtasks.exe 4800 schtasks.exe 3504 schtasks.exe 3488 schtasks.exe 4520 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1344 WinsessionBrokernetIntohost.exe 1508 dwm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1344 WinsessionBrokernetIntohost.exe Token: SeDebugPrivilege 1508 dwm.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3592 wrote to memory of 2928 3592 JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe 83 PID 3592 wrote to memory of 2928 3592 JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe 83 PID 3592 wrote to memory of 2928 3592 JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe 83 PID 2928 wrote to memory of 5044 2928 WScript.exe 93 PID 2928 wrote to memory of 5044 2928 WScript.exe 93 PID 2928 wrote to memory of 5044 2928 WScript.exe 93 PID 5044 wrote to memory of 1344 5044 cmd.exe 95 PID 5044 wrote to memory of 1344 5044 cmd.exe 95 PID 1344 wrote to memory of 3252 1344 WinsessionBrokernetIntohost.exe 104 PID 1344 wrote to memory of 3252 1344 WinsessionBrokernetIntohost.exe 104 PID 3252 wrote to memory of 376 3252 cmd.exe 106 PID 3252 wrote to memory of 376 3252 cmd.exe 106 PID 3252 wrote to memory of 1508 3252 cmd.exe 112 PID 3252 wrote to memory of 1508 3252 cmd.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f67e9c9915e81bd08ebb0e2b57909677.exe"1⤵
- DcRat
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\WinsessionBrokernet\ufqa67DL2gtzgC.vbe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\WinsessionBrokernet\vxdOo.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Roaming\WinsessionBrokernet\WinsessionBrokernetIntohost.exe"C:\Users\Admin\AppData\Roaming\WinsessionBrokernet\WinsessionBrokernetIntohost.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Jcrk07F19t.bat"5⤵
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:376
-
-
C:\Windows\System32\Windows.UI.Xaml.Resources.win8rtm\dwm.exe"C:\Windows\System32\Windows.UI.Xaml.Resources.win8rtm\dwm.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WinsessionBrokernetIntohost" /sc ONLOGON /tr "'C:\Windows\IME\WinsessionBrokernetIntohost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2288
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\System32\BdeHdCfgLib\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\Windows.UI.Xaml.Resources.win8rtm\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:64
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Documents and Settings\conhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\InputHost\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Default\Favorites\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3504
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\System32\cmstp\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\TrustedSignalCredProv\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4520
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225B
MD5179c3e8e3cafe3e0d38f0e72bfa7f427
SHA1965e2ff7c18b7042e32c573b56c7b3b28ccf8e67
SHA2563b7dcf66079034acc823328422b974eb179b081f8e8e2b9571dff6f1852ee8ff
SHA512e86e72552abbc08fbe0bdff0ffc38a1ae9f1b6bdc2c92d6000a83e8c9b8618a291fc85863ccc45a4b6f4e00c3d14a28b2229da55a1065fe55630d23a614d7270
-
Filesize
910KB
MD53c0e66c07059d17b9dec156ae1f99fcf
SHA1a9cf63368c43a839590f55a4896d503909d4ea76
SHA256bd10ea4eeb2a7f1e9b3157ce51752336fe3d6dc56fb49bdc736bbe0ea34f5936
SHA5124a7d7555e6cf982c62fe7185f7b147c959a82b3be5e33aeec7bc9f22ab8adcdf4cf9ca10a2a7be50a7f98c19402f8bde9fff22ff8de3e3727a8a35604767ab39
-
Filesize
208B
MD579ec3118b469d48b8b3b6a1c0b330fb5
SHA19ef874c6a1ca3af5e07e83260dee0dc6ff7e3816
SHA256b3bbe75c2eed62015193612b19c38eabb1c7a7b51797ad9ffa26b1eb7485839f
SHA5120d085322c07d4553cbe7303a1a88ec329845a25ba07efe83989f912ab4e311f7ef891c2c071e87adb2de2b8b2c4e4ef5a2673b02ad8b45444e6663ead1fd0580
-
Filesize
63B
MD5ea5bc8528b06faf92eaa4f0d6194365b
SHA1734509caf332eeffcdfea6d079b45653876e221d
SHA256e1d8b03b08fd259e5a9cda84dc3f646bd68701ae82586e48072b62107dfb0f7a
SHA51211cc2fd1bd98468908a197944fbd133c23899284fb745159b140d9e1f477d8c96a03c167a229814089fdc31ceed18d32992f05dd96369cbed290b3004d298edb