Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/02/2025, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe
Resource
win10v2004-20250211-en
General
-
Target
JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe
-
Size
891KB
-
MD5
ea271405c5d515469356a082f5a16dd6
-
SHA1
bf2b2451d4d8e656067c81cf14362b9702ed7a57
-
SHA256
91a04cda5888aa5c4e0e8cdd09d5576836d3714c39446a510ddb7f88ae372ae4
-
SHA512
dc3c5ea202e4e311cbc35dc8d53b616bf657de01d91da9ce0e92ed39616424b3002035e41fe915791ba53f9b8822ea2c9100b22777ea0a4dac438be71a283440
-
SSDEEP
24576:kKtgTB/3lPQZLh9h5qKUpEZl8fCjDS/2V0cs3:TAB/gLhw/ajDo2V0cK
Malware Config
Extracted
darkcomet
Guest16
mylovely.zapto.org:1604
DC_MUTEX-FJ778YZ
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
ohg$v1#/-qld
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicrosoftUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" msdcsc.exe -
Windows security bypass 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Executes dropped EXE 3 IoCs
pid Process 2680 FACEBOOK.EXE 2564 msdcsc.exe 2196 msdcsc.exe -
Loads dropped DLL 3 IoCs
pid Process 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 checkip.dyndns.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2680-74-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2436 set thread context of 2704 2436 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 31 PID 2564 set thread context of 2196 2564 msdcsc.exe 34 PID 2196 set thread context of 2876 2196 msdcsc.exe 35 -
resource yara_rule behavioral1/memory/2704-11-0x0000000000400000-0x000000000054C000-memory.dmp upx behavioral1/memory/2704-14-0x0000000000400000-0x000000000054C000-memory.dmp upx behavioral1/memory/2704-15-0x0000000000400000-0x000000000054C000-memory.dmp upx behavioral1/memory/2704-7-0x0000000000400000-0x000000000054C000-memory.dmp upx behavioral1/memory/2704-6-0x0000000000400000-0x000000000054C000-memory.dmp upx behavioral1/memory/2704-16-0x0000000000400000-0x000000000054C000-memory.dmp upx behavioral1/memory/2704-17-0x0000000000400000-0x000000000054C000-memory.dmp upx behavioral1/memory/2704-18-0x0000000000400000-0x000000000054C000-memory.dmp upx behavioral1/files/0x00070000000174f8-24.dat upx behavioral1/memory/2680-29-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/2704-28-0x0000000003790000-0x0000000003851000-memory.dmp upx behavioral1/memory/2704-42-0x0000000000400000-0x000000000054C000-memory.dmp upx behavioral1/memory/2196-61-0x0000000000400000-0x000000000054C000-memory.dmp upx behavioral1/memory/2196-59-0x0000000000400000-0x000000000054C000-memory.dmp upx behavioral1/memory/2196-58-0x0000000000400000-0x000000000054C000-memory.dmp upx behavioral1/memory/2196-60-0x0000000000400000-0x000000000054C000-memory.dmp upx behavioral1/memory/2196-68-0x0000000000400000-0x000000000054C000-memory.dmp upx behavioral1/memory/2196-73-0x0000000000400000-0x000000000054C000-memory.dmp upx behavioral1/memory/2680-74-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FACEBOOK.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2680 FACEBOOK.EXE -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeSecurityPrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeTakeOwnershipPrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeLoadDriverPrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeSystemProfilePrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeSystemtimePrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeProfSingleProcessPrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeIncBasePriorityPrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeCreatePagefilePrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeBackupPrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeRestorePrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeShutdownPrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeDebugPrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeSystemEnvironmentPrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeChangeNotifyPrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeRemoteShutdownPrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeUndockPrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeManageVolumePrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeImpersonatePrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeCreateGlobalPrivilege 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: 33 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: 34 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: 35 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe Token: SeIncreaseQuotaPrivilege 2196 msdcsc.exe Token: SeSecurityPrivilege 2196 msdcsc.exe Token: SeTakeOwnershipPrivilege 2196 msdcsc.exe Token: SeLoadDriverPrivilege 2196 msdcsc.exe Token: SeSystemProfilePrivilege 2196 msdcsc.exe Token: SeSystemtimePrivilege 2196 msdcsc.exe Token: SeProfSingleProcessPrivilege 2196 msdcsc.exe Token: SeIncBasePriorityPrivilege 2196 msdcsc.exe Token: SeCreatePagefilePrivilege 2196 msdcsc.exe Token: SeBackupPrivilege 2196 msdcsc.exe Token: SeRestorePrivilege 2196 msdcsc.exe Token: SeShutdownPrivilege 2196 msdcsc.exe Token: SeDebugPrivilege 2196 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2196 msdcsc.exe Token: SeChangeNotifyPrivilege 2196 msdcsc.exe Token: SeRemoteShutdownPrivilege 2196 msdcsc.exe Token: SeUndockPrivilege 2196 msdcsc.exe Token: SeManageVolumePrivilege 2196 msdcsc.exe Token: SeImpersonatePrivilege 2196 msdcsc.exe Token: SeCreateGlobalPrivilege 2196 msdcsc.exe Token: 33 2196 msdcsc.exe Token: 34 2196 msdcsc.exe Token: 35 2196 msdcsc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2680 FACEBOOK.EXE 2680 FACEBOOK.EXE 2680 FACEBOOK.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2680 FACEBOOK.EXE 2680 FACEBOOK.EXE 2680 FACEBOOK.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2436 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 2564 msdcsc.exe 2876 iexplore.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2704 2436 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 31 PID 2436 wrote to memory of 2704 2436 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 31 PID 2436 wrote to memory of 2704 2436 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 31 PID 2436 wrote to memory of 2704 2436 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 31 PID 2436 wrote to memory of 2704 2436 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 31 PID 2436 wrote to memory of 2704 2436 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 31 PID 2436 wrote to memory of 2704 2436 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 31 PID 2436 wrote to memory of 2704 2436 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 31 PID 2704 wrote to memory of 2680 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 32 PID 2704 wrote to memory of 2680 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 32 PID 2704 wrote to memory of 2680 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 32 PID 2704 wrote to memory of 2680 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 32 PID 2704 wrote to memory of 2564 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 33 PID 2704 wrote to memory of 2564 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 33 PID 2704 wrote to memory of 2564 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 33 PID 2704 wrote to memory of 2564 2704 JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe 33 PID 2564 wrote to memory of 2196 2564 msdcsc.exe 34 PID 2564 wrote to memory of 2196 2564 msdcsc.exe 34 PID 2564 wrote to memory of 2196 2564 msdcsc.exe 34 PID 2564 wrote to memory of 2196 2564 msdcsc.exe 34 PID 2564 wrote to memory of 2196 2564 msdcsc.exe 34 PID 2564 wrote to memory of 2196 2564 msdcsc.exe 34 PID 2564 wrote to memory of 2196 2564 msdcsc.exe 34 PID 2564 wrote to memory of 2196 2564 msdcsc.exe 34 PID 2196 wrote to memory of 2876 2196 msdcsc.exe 35 PID 2196 wrote to memory of 2876 2196 msdcsc.exe 35 PID 2196 wrote to memory of 2876 2196 msdcsc.exe 35 PID 2196 wrote to memory of 2876 2196 msdcsc.exe 35 PID 2196 wrote to memory of 2876 2196 msdcsc.exe 35 PID 2196 wrote to memory of 2876 2196 msdcsc.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ea271405c5d515469356a082f5a16dd6.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\FACEBOOK.EXE"C:\Users\Admin\AppData\Local\Temp\FACEBOOK.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2680
-
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2876
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3063565911-2056067323-3330884624-1000\699c4b9cdebca7aaea5193cae8a50098_de87a6d6-9d44-4942-9ec6-2be31b435411
Filesize50B
MD55b63d4dd8c04c88c0e30e494ec6a609a
SHA1884d5a8bdc25fe794dc22ef9518009dcf0069d09
SHA2564d93c22555b3169e5c13716ca59b8b22892c69b3025aea841afe5259698102fd
SHA51215ff8551ac6b9de978050569bcdc26f44dfc06a0eaf445ac70fd45453a21bdafa3e4c8b4857d6a1c3226f4102a639682bdfb71d7b255062fb81a51c9126896cb
-
Filesize
891KB
MD5ea271405c5d515469356a082f5a16dd6
SHA1bf2b2451d4d8e656067c81cf14362b9702ed7a57
SHA25691a04cda5888aa5c4e0e8cdd09d5576836d3714c39446a510ddb7f88ae372ae4
SHA512dc3c5ea202e4e311cbc35dc8d53b616bf657de01d91da9ce0e92ed39616424b3002035e41fe915791ba53f9b8822ea2c9100b22777ea0a4dac438be71a283440
-
Filesize
409KB
MD5a376b12add1f0341b8eb607994171a8d
SHA1833518195776950b175cf681de819a249a5142a6
SHA256c1bb4bbdca067c0419c4f1ddf1ef48b77dc4c8221d6fc6c3dcc1921b4d02299e
SHA5124445fff21b4bae2dc56293b14ef55769423afab59eecc91b77ae05f17d87335eee41ffcad4bbfc71f7e47de4ff839b1e80e52c8d9554eb5dd110a33cc24a1b63