Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2025, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe
-
Size
800KB
-
MD5
b6b6a5213f8b3e7ce5306cd069dcbf5e
-
SHA1
9991f4da8630039b84f4bf8c1b45fec898fa80b7
-
SHA256
27b67644170b08d57dcd8bb39d9b779632aad6697845015175e51e4801a42a5a
-
SHA512
bb0deacba3eeca40fe69990c30a9a3cee3d82052d895a50e7c92b461ca19ecf6c1109209763b6df4ea2fe9c3565c672fe63c7a11dfd9692ba71fae223eafb6ea
-
SSDEEP
12288:+f9tz7HqHG/niI+dExFzfPrwbg1llIfUls:+f7z7HqKsE+2lIff
Malware Config
Extracted
darkcomet
Guest16
speeed.hopto.org:147
DC_MUTEX-HGY40HP
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
cNTlixxZgYma
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\cNTlixxZgYma\\msdcsc.exe" JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\cNTlixxZgYma\\msdcsc.exe" JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 392 3884 WerFault.exe 84 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1852 set thread context of 3884 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeSecurityPrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeTakeOwnershipPrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeLoadDriverPrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeSystemProfilePrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeSystemtimePrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeProfSingleProcessPrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeIncBasePriorityPrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeCreatePagefilePrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeBackupPrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeRestorePrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeShutdownPrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeDebugPrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeSystemEnvironmentPrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeChangeNotifyPrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeRemoteShutdownPrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeUndockPrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeManageVolumePrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeImpersonatePrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: SeCreateGlobalPrivilege 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: 33 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: 34 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: 35 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe Token: 36 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1852 wrote to memory of 3884 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe 84 PID 1852 wrote to memory of 3884 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe 84 PID 1852 wrote to memory of 3884 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe 84 PID 1852 wrote to memory of 3884 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe 84 PID 1852 wrote to memory of 3884 1852 JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b6b6a5213f8b3e7ce5306cd069dcbf5e.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵PID:3884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3884 -s 2843⤵
- Program crash
PID:392
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3884 -ip 38841⤵PID:1492