Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
submitted
06/02/2025, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe
-
Size
870KB
-
MD5
ab1935bc92bd21dc3785047cf028ec5f
-
SHA1
216604dbbeff4ce30e8ee51ef50156024cc91ae6
-
SHA256
b22ff14ede69c70b647ff15860bfe0c3caac3fb5c6e9c57574d0675159af568c
-
SHA512
47bb99e82733aac9066794d71c02a3b920ca433a53e5c7488abc29121ca1b658a924a5fc6256ddfd410a3d4e634ac2323989fbb84f4c8cea6e652871562eaae9
-
SSDEEP
12288:rj7BhxQlLuUxnfSZrRGypSbai8Kx03Old+m5sO0NFMh/U+xNbul0NBs9oYojKxDs:rraM/PywFgMz2NK28Yu+
Malware Config
Extracted
darkcomet
Guest16
createaz.no-ip.info:1995
DC_MUTEX-JRLV581
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
C=XVpvd=zF*i
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" vbc.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation vbc.exe -
Executes dropped EXE 4 IoCs
pid Process 2932 vbc.exe 2336 STAR CRYPTER [PUBLIC] V1.3.EXE 4556 msdcsc.exe 1700 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" vbc.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini STAR CRYPTER [PUBLIC] V1.3.EXE File created C:\Windows\assembly\Desktop.ini STAR CRYPTER [PUBLIC] V1.3.EXE -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1328 set thread context of 2932 1328 JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe 84 PID 4556 set thread context of 1700 4556 msdcsc.exe 90 -
resource yara_rule behavioral2/memory/2932-5-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2932-11-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2932-10-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2932-13-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2932-12-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2932-9-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/2932-94-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-106-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-107-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-105-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-111-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-110-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-109-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-114-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-115-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-116-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-117-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-118-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-119-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-120-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-121-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-122-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-123-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-124-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-125-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-126-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-127-0x0000000000400000-0x0000000000510000-memory.dmp upx behavioral2/memory/1700-128-0x0000000000400000-0x0000000000510000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly STAR CRYPTER [PUBLIC] V1.3.EXE File created C:\Windows\assembly\Desktop.ini STAR CRYPTER [PUBLIC] V1.3.EXE File opened for modification C:\Windows\assembly\Desktop.ini STAR CRYPTER [PUBLIC] V1.3.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ vbc.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2932 vbc.exe Token: SeSecurityPrivilege 2932 vbc.exe Token: SeTakeOwnershipPrivilege 2932 vbc.exe Token: SeLoadDriverPrivilege 2932 vbc.exe Token: SeSystemProfilePrivilege 2932 vbc.exe Token: SeSystemtimePrivilege 2932 vbc.exe Token: SeProfSingleProcessPrivilege 2932 vbc.exe Token: SeIncBasePriorityPrivilege 2932 vbc.exe Token: SeCreatePagefilePrivilege 2932 vbc.exe Token: SeBackupPrivilege 2932 vbc.exe Token: SeRestorePrivilege 2932 vbc.exe Token: SeShutdownPrivilege 2932 vbc.exe Token: SeDebugPrivilege 2932 vbc.exe Token: SeSystemEnvironmentPrivilege 2932 vbc.exe Token: SeChangeNotifyPrivilege 2932 vbc.exe Token: SeRemoteShutdownPrivilege 2932 vbc.exe Token: SeUndockPrivilege 2932 vbc.exe Token: SeManageVolumePrivilege 2932 vbc.exe Token: SeImpersonatePrivilege 2932 vbc.exe Token: SeCreateGlobalPrivilege 2932 vbc.exe Token: 33 2932 vbc.exe Token: 34 2932 vbc.exe Token: 35 2932 vbc.exe Token: 36 2932 vbc.exe Token: SeIncreaseQuotaPrivilege 1700 vbc.exe Token: SeSecurityPrivilege 1700 vbc.exe Token: SeTakeOwnershipPrivilege 1700 vbc.exe Token: SeLoadDriverPrivilege 1700 vbc.exe Token: SeSystemProfilePrivilege 1700 vbc.exe Token: SeSystemtimePrivilege 1700 vbc.exe Token: SeProfSingleProcessPrivilege 1700 vbc.exe Token: SeIncBasePriorityPrivilege 1700 vbc.exe Token: SeCreatePagefilePrivilege 1700 vbc.exe Token: SeBackupPrivilege 1700 vbc.exe Token: SeRestorePrivilege 1700 vbc.exe Token: SeShutdownPrivilege 1700 vbc.exe Token: SeDebugPrivilege 1700 vbc.exe Token: SeSystemEnvironmentPrivilege 1700 vbc.exe Token: SeChangeNotifyPrivilege 1700 vbc.exe Token: SeRemoteShutdownPrivilege 1700 vbc.exe Token: SeUndockPrivilege 1700 vbc.exe Token: SeManageVolumePrivilege 1700 vbc.exe Token: SeImpersonatePrivilege 1700 vbc.exe Token: SeCreateGlobalPrivilege 1700 vbc.exe Token: 33 1700 vbc.exe Token: 34 1700 vbc.exe Token: 35 1700 vbc.exe Token: 36 1700 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1700 vbc.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1328 wrote to memory of 2932 1328 JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe 84 PID 1328 wrote to memory of 2932 1328 JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe 84 PID 1328 wrote to memory of 2932 1328 JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe 84 PID 1328 wrote to memory of 2932 1328 JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe 84 PID 1328 wrote to memory of 2932 1328 JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe 84 PID 1328 wrote to memory of 2932 1328 JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe 84 PID 1328 wrote to memory of 2932 1328 JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe 84 PID 1328 wrote to memory of 2932 1328 JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe 84 PID 1328 wrote to memory of 2932 1328 JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe 84 PID 1328 wrote to memory of 2932 1328 JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe 84 PID 2932 wrote to memory of 2336 2932 vbc.exe 87 PID 2932 wrote to memory of 2336 2932 vbc.exe 87 PID 2932 wrote to memory of 4556 2932 vbc.exe 89 PID 2932 wrote to memory of 4556 2932 vbc.exe 89 PID 2932 wrote to memory of 4556 2932 vbc.exe 89 PID 4556 wrote to memory of 1700 4556 msdcsc.exe 90 PID 4556 wrote to memory of 1700 4556 msdcsc.exe 90 PID 4556 wrote to memory of 1700 4556 msdcsc.exe 90 PID 4556 wrote to memory of 1700 4556 msdcsc.exe 90 PID 4556 wrote to memory of 1700 4556 msdcsc.exe 90 PID 4556 wrote to memory of 1700 4556 msdcsc.exe 90 PID 4556 wrote to memory of 1700 4556 msdcsc.exe 90 PID 4556 wrote to memory of 1700 4556 msdcsc.exe 90 PID 4556 wrote to memory of 1700 4556 msdcsc.exe 90 PID 4556 wrote to memory of 1700 4556 msdcsc.exe 90 PID 1700 wrote to memory of 3624 1700 vbc.exe 91 PID 1700 wrote to memory of 3624 1700 vbc.exe 91 PID 1700 wrote to memory of 3624 1700 vbc.exe 91 PID 1700 wrote to memory of 1440 1700 vbc.exe 92 PID 1700 wrote to memory of 1440 1700 vbc.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab1935bc92bd21dc3785047cf028ec5f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\STAR CRYPTER [PUBLIC] V1.3.EXE"C:\Users\Admin\AppData\Local\Temp\STAR CRYPTER [PUBLIC] V1.3.EXE"3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
PID:2336
-
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"5⤵PID:3624
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"5⤵PID:1440
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166KB
MD53a858af0c3716a5db1cb1de25e715e16
SHA1ae848d345737f2915294d4af3efd51b5c4a34ece
SHA256ee1884836e964010846b5da3fa4e3572d668a560da4db6c10f0d42e3641805f6
SHA512eb4abfba30a3f1a3f9a4622f544413c28c9791f71e859f0cc360e84b5308e445d7265358f407a2ac843b374c541b710432c7fb42a5de5f5ca34e334e70f1546f
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
870KB
MD5ab1935bc92bd21dc3785047cf028ec5f
SHA1216604dbbeff4ce30e8ee51ef50156024cc91ae6
SHA256b22ff14ede69c70b647ff15860bfe0c3caac3fb5c6e9c57574d0675159af568c
SHA51247bb99e82733aac9066794d71c02a3b920ca433a53e5c7488abc29121ca1b658a924a5fc6256ddfd410a3d4e634ac2323989fbb84f4c8cea6e652871562eaae9