Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
12/02/2025, 03:51
Behavioral task
behavioral1
Sample
JaffaCakes118_ece22edeb630f6ea780e2ddc01fa0005.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_ece22edeb630f6ea780e2ddc01fa0005.exe
-
Size
423KB
-
MD5
ece22edeb630f6ea780e2ddc01fa0005
-
SHA1
1804adb8a736799c0d8c3b9556335b19c7d83ebb
-
SHA256
43ed2b2e7cea9419473cdb249f29f9d5d340c955046e9ccfd4506a9ea9bcb60c
-
SHA512
0c0291723dfdd0645c3a0d8ebb95cb4b3b71468e258d3ff95e4864db1afba8f8db99ff11e2a08e3e97b597ce51dd004132df6f44bbcefd2b89be1a2dfd6d1a3f
-
SSDEEP
12288:ClghoSqaNJ/Jj0rvipd0ysnewRU16PUAQ9muZ:Qg2aNb0rqkyWO1mU58A
Malware Config
Extracted
darkcomet
Guest16
kurd97.no-ip.org:1604
DC_MUTEX-F54S21D
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
1U7AdLWZPz0J
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" Stage1.exe -
Executes dropped EXE 3 IoCs
pid Process 2432 Stage2.exe 2852 Stage1.exe 2964 msdcsc.exe -
Loads dropped DLL 6 IoCs
pid Process 2416 JaffaCakes118_ece22edeb630f6ea780e2ddc01fa0005.exe 2416 JaffaCakes118_ece22edeb630f6ea780e2ddc01fa0005.exe 2416 JaffaCakes118_ece22edeb630f6ea780e2ddc01fa0005.exe 2416 JaffaCakes118_ece22edeb630f6ea780e2ddc01fa0005.exe 2852 Stage1.exe 2852 Stage1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" Stage1.exe -
resource yara_rule behavioral1/memory/2416-0-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/files/0x000c00000001202c-6.dat upx behavioral1/memory/2432-13-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/2432-17-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral1/memory/2416-35-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ece22edeb630f6ea780e2ddc01fa0005.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Stage2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Stage1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2852 Stage1.exe Token: SeSecurityPrivilege 2852 Stage1.exe Token: SeTakeOwnershipPrivilege 2852 Stage1.exe Token: SeLoadDriverPrivilege 2852 Stage1.exe Token: SeSystemProfilePrivilege 2852 Stage1.exe Token: SeSystemtimePrivilege 2852 Stage1.exe Token: SeProfSingleProcessPrivilege 2852 Stage1.exe Token: SeIncBasePriorityPrivilege 2852 Stage1.exe Token: SeCreatePagefilePrivilege 2852 Stage1.exe Token: SeBackupPrivilege 2852 Stage1.exe Token: SeRestorePrivilege 2852 Stage1.exe Token: SeShutdownPrivilege 2852 Stage1.exe Token: SeDebugPrivilege 2852 Stage1.exe Token: SeSystemEnvironmentPrivilege 2852 Stage1.exe Token: SeChangeNotifyPrivilege 2852 Stage1.exe Token: SeRemoteShutdownPrivilege 2852 Stage1.exe Token: SeUndockPrivilege 2852 Stage1.exe Token: SeManageVolumePrivilege 2852 Stage1.exe Token: SeImpersonatePrivilege 2852 Stage1.exe Token: SeCreateGlobalPrivilege 2852 Stage1.exe Token: 33 2852 Stage1.exe Token: 34 2852 Stage1.exe Token: 35 2852 Stage1.exe Token: SeIncreaseQuotaPrivilege 2964 msdcsc.exe Token: SeSecurityPrivilege 2964 msdcsc.exe Token: SeTakeOwnershipPrivilege 2964 msdcsc.exe Token: SeLoadDriverPrivilege 2964 msdcsc.exe Token: SeSystemProfilePrivilege 2964 msdcsc.exe Token: SeSystemtimePrivilege 2964 msdcsc.exe Token: SeProfSingleProcessPrivilege 2964 msdcsc.exe Token: SeIncBasePriorityPrivilege 2964 msdcsc.exe Token: SeCreatePagefilePrivilege 2964 msdcsc.exe Token: SeBackupPrivilege 2964 msdcsc.exe Token: SeRestorePrivilege 2964 msdcsc.exe Token: SeShutdownPrivilege 2964 msdcsc.exe Token: SeDebugPrivilege 2964 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2964 msdcsc.exe Token: SeChangeNotifyPrivilege 2964 msdcsc.exe Token: SeRemoteShutdownPrivilege 2964 msdcsc.exe Token: SeUndockPrivilege 2964 msdcsc.exe Token: SeManageVolumePrivilege 2964 msdcsc.exe Token: SeImpersonatePrivilege 2964 msdcsc.exe Token: SeCreateGlobalPrivilege 2964 msdcsc.exe Token: 33 2964 msdcsc.exe Token: 34 2964 msdcsc.exe Token: 35 2964 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2964 msdcsc.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2432 2416 JaffaCakes118_ece22edeb630f6ea780e2ddc01fa0005.exe 30 PID 2416 wrote to memory of 2432 2416 JaffaCakes118_ece22edeb630f6ea780e2ddc01fa0005.exe 30 PID 2416 wrote to memory of 2432 2416 JaffaCakes118_ece22edeb630f6ea780e2ddc01fa0005.exe 30 PID 2416 wrote to memory of 2432 2416 JaffaCakes118_ece22edeb630f6ea780e2ddc01fa0005.exe 30 PID 2416 wrote to memory of 2852 2416 JaffaCakes118_ece22edeb630f6ea780e2ddc01fa0005.exe 32 PID 2416 wrote to memory of 2852 2416 JaffaCakes118_ece22edeb630f6ea780e2ddc01fa0005.exe 32 PID 2416 wrote to memory of 2852 2416 JaffaCakes118_ece22edeb630f6ea780e2ddc01fa0005.exe 32 PID 2416 wrote to memory of 2852 2416 JaffaCakes118_ece22edeb630f6ea780e2ddc01fa0005.exe 32 PID 2852 wrote to memory of 2964 2852 Stage1.exe 33 PID 2852 wrote to memory of 2964 2852 Stage1.exe 33 PID 2852 wrote to memory of 2964 2852 Stage1.exe 33 PID 2852 wrote to memory of 2964 2852 Stage1.exe 33 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34 PID 2964 wrote to memory of 3060 2964 msdcsc.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ece22edeb630f6ea780e2ddc01fa0005.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ece22edeb630f6ea780e2ddc01fa0005.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Stage2.exe"C:\Users\Admin\AppData\Local\Temp\Stage2.exe" x -y -oC:\Users\Admin\AppData\Local\Temp -pxnq8rPMxVI87ciGwWJHxRTy3iauHcIirteOOELv3B5vkS9kJoHBUAahY1dWxj8yA2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2432
-
-
C:\Users\Admin\AppData\Local\Temp\Stage1.exe"C:\Users\Admin\AppData\Local\Temp\Stage1.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\notepad.exenotepad4⤵
- System Location Discovery: System Language Discovery
PID:3060
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
758KB
MD57c303d83d9e98481a51fbb713d9167ad
SHA141161fa33b57592a45283f49ce8639aeddc9505f
SHA25603f99cbd454ab8b5d2fab9720f0280f4ebc7ff3d011278cac422894263f300fb
SHA512013c590078de3830b6425ee45218e93739470b14c33538b25740a8b32b2054ba1efda306703d2a17429619b72774c789679a348082d847aaee09916ec0146473
-
Filesize
376KB
MD5ba4812abf562446e2bcda7f952a89593
SHA1d6ce12b940c0564cbe6880947babf98caa818945
SHA25634535400b392d926fa1f5ed60a768659afd57d33b969676a9ca6675961063127
SHA512d44f7445a42a17f9ab7f662222a53442317eb8c64d6516ece6881b6c923360880e068708da84a9d1add66498b7cc8fe7c9a320b9bdd6a7a0f2dcd3d5f3a5f38b