Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2025, 10:28
Behavioral task
behavioral1
Sample
JaffaCakes118_f6c9055d523b94dd0dd20cb2d59ce039.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f6c9055d523b94dd0dd20cb2d59ce039.exe
Resource
win10v2004-20250207-en
General
-
Target
JaffaCakes118_f6c9055d523b94dd0dd20cb2d59ce039.exe
-
Size
423KB
-
MD5
f6c9055d523b94dd0dd20cb2d59ce039
-
SHA1
b25235cf8781ef947a70cebbe5ab5d3cfc18b442
-
SHA256
6b4200469bff3fb5fd0c7880de7f67d2fa83260a4159bf3d2305e73f005cdf05
-
SHA512
bcc8ae473369b75ec54d83fab15c4eb1a582ac7b64db62e45976c4b979d8c9623113bcf6bf520496f9c9f33d9b4b2a2cdd27dee7c74a844f04883176021d03bf
-
SSDEEP
12288:2lghoSqDNJ/Jj0PeLTCdKET05/hM4/KZood31gLeiW:8g2DNb0wCdKVhny/d31IeiW
Malware Config
Extracted
darkcomet
Victim
dcrat214.no-ip.biz:1604
DC_MUTEX-E5E9EN3
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
ndFoCwbBFulg
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Desktop\\MSDCSC\\msdcsc.exe" Stage1.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe -
Windows security bypass 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 37 2168 Process not Found -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Control Panel\International\Geo\Nation JaffaCakes118_f6c9055d523b94dd0dd20cb2d59ce039.exe Key value queried \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Control Panel\International\Geo\Nation Stage1.exe -
Executes dropped EXE 3 IoCs
pid Process 3044 Stage2.exe 2200 Stage1.exe 3616 msdcsc.exe -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Desktop\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Desktop\\MSDCSC\\msdcsc.exe" Stage1.exe -
resource yara_rule behavioral2/memory/4956-0-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/files/0x000c000000023d1a-5.dat upx behavioral2/memory/3044-12-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral2/memory/3044-16-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral2/files/0x0009000000023e08-17.dat upx behavioral2/memory/2200-19-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/2200-34-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/4956-36-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/3616-38-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/3616-39-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/3616-40-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/3616-42-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/3616-43-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/3616-44-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/3616-45-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/3616-46-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/3616-47-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/3616-48-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/3616-49-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/3616-50-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/3616-51-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/3616-52-0x0000000000400000-0x00000000004EB000-memory.dmp upx behavioral2/memory/3616-53-0x0000000000400000-0x00000000004EB000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f6c9055d523b94dd0dd20cb2d59ce039.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Stage2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Stage1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2284 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2200 Stage1.exe Token: SeSecurityPrivilege 2200 Stage1.exe Token: SeTakeOwnershipPrivilege 2200 Stage1.exe Token: SeLoadDriverPrivilege 2200 Stage1.exe Token: SeSystemProfilePrivilege 2200 Stage1.exe Token: SeSystemtimePrivilege 2200 Stage1.exe Token: SeProfSingleProcessPrivilege 2200 Stage1.exe Token: SeIncBasePriorityPrivilege 2200 Stage1.exe Token: SeCreatePagefilePrivilege 2200 Stage1.exe Token: SeBackupPrivilege 2200 Stage1.exe Token: SeRestorePrivilege 2200 Stage1.exe Token: SeShutdownPrivilege 2200 Stage1.exe Token: SeDebugPrivilege 2200 Stage1.exe Token: SeSystemEnvironmentPrivilege 2200 Stage1.exe Token: SeChangeNotifyPrivilege 2200 Stage1.exe Token: SeRemoteShutdownPrivilege 2200 Stage1.exe Token: SeUndockPrivilege 2200 Stage1.exe Token: SeManageVolumePrivilege 2200 Stage1.exe Token: SeImpersonatePrivilege 2200 Stage1.exe Token: SeCreateGlobalPrivilege 2200 Stage1.exe Token: 33 2200 Stage1.exe Token: 34 2200 Stage1.exe Token: 35 2200 Stage1.exe Token: 36 2200 Stage1.exe Token: SeIncreaseQuotaPrivilege 3616 msdcsc.exe Token: SeSecurityPrivilege 3616 msdcsc.exe Token: SeTakeOwnershipPrivilege 3616 msdcsc.exe Token: SeLoadDriverPrivilege 3616 msdcsc.exe Token: SeSystemProfilePrivilege 3616 msdcsc.exe Token: SeSystemtimePrivilege 3616 msdcsc.exe Token: SeProfSingleProcessPrivilege 3616 msdcsc.exe Token: SeIncBasePriorityPrivilege 3616 msdcsc.exe Token: SeCreatePagefilePrivilege 3616 msdcsc.exe Token: SeBackupPrivilege 3616 msdcsc.exe Token: SeRestorePrivilege 3616 msdcsc.exe Token: SeShutdownPrivilege 3616 msdcsc.exe Token: SeDebugPrivilege 3616 msdcsc.exe Token: SeSystemEnvironmentPrivilege 3616 msdcsc.exe Token: SeChangeNotifyPrivilege 3616 msdcsc.exe Token: SeRemoteShutdownPrivilege 3616 msdcsc.exe Token: SeUndockPrivilege 3616 msdcsc.exe Token: SeManageVolumePrivilege 3616 msdcsc.exe Token: SeImpersonatePrivilege 3616 msdcsc.exe Token: SeCreateGlobalPrivilege 3616 msdcsc.exe Token: 33 3616 msdcsc.exe Token: 34 3616 msdcsc.exe Token: 35 3616 msdcsc.exe Token: 36 3616 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3616 msdcsc.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 4956 wrote to memory of 3044 4956 JaffaCakes118_f6c9055d523b94dd0dd20cb2d59ce039.exe 86 PID 4956 wrote to memory of 3044 4956 JaffaCakes118_f6c9055d523b94dd0dd20cb2d59ce039.exe 86 PID 4956 wrote to memory of 3044 4956 JaffaCakes118_f6c9055d523b94dd0dd20cb2d59ce039.exe 86 PID 4956 wrote to memory of 2200 4956 JaffaCakes118_f6c9055d523b94dd0dd20cb2d59ce039.exe 91 PID 4956 wrote to memory of 2200 4956 JaffaCakes118_f6c9055d523b94dd0dd20cb2d59ce039.exe 91 PID 4956 wrote to memory of 2200 4956 JaffaCakes118_f6c9055d523b94dd0dd20cb2d59ce039.exe 91 PID 2200 wrote to memory of 3616 2200 Stage1.exe 92 PID 2200 wrote to memory of 3616 2200 Stage1.exe 92 PID 2200 wrote to memory of 3616 2200 Stage1.exe 92 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93 PID 3616 wrote to memory of 4004 3616 msdcsc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f6c9055d523b94dd0dd20cb2d59ce039.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f6c9055d523b94dd0dd20cb2d59ce039.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\Stage2.exe"C:\Users\Admin\AppData\Local\Temp\Stage2.exe" x -y -oC:\Users\Admin\AppData\Local\Temp -pxnq8rPMxVI87ciGwWJHxRTy3iauHcIirteOOELv3B5vkS9kJoHBUAahY1dWxj8yA2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\Stage1.exe"C:\Users\Admin\AppData\Local\Temp\Stage1.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\Desktop\MSDCSC\msdcsc.exe"C:\Users\Admin\Desktop\MSDCSC\msdcsc.exe"3⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\notepad.exenotepad4⤵
- System Location Discovery: System Language Discovery
PID:4004
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI2IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTg4MDA2MzIzIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2284
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
350KB
MD51a3a42d3d621acd0cce4e26240cc5331
SHA102f88aa3ec75ea70e3ac41268127d9e6eb07c1b9
SHA256f96860108478891f56d8e17d2931a6f4ce9c10a9eade93acc1d7383aff83247a
SHA5127a104d244128c8ce293a652a247d9351c9d38c9686b2090964898bcfa7c3fd44557f7259e789f29c332a0c099a2934c5b435f98b3432648d14adabf0b6be4e57
-
Filesize
376KB
MD5d826177f567069f085caf08bd5b3d479
SHA13b9d5af3c2e49c11bdf052ac6100e6acf7dbdfdd
SHA2568be7a28c874ae1121a057b3f12fd3632c8539083d2d95cd7871f6a70e9bd5078
SHA512752552e39abaf3c518f828d2c3499142b66bc06264e004b5b1cb2ff699a0c6f0d8b342fb141b43c1f7f7de1be4f3ae3b694307a565595d96da35949d552b0c4d