Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2025, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe
-
Size
1.8MB
-
MD5
f8349d63d18628e5bcf39919ddf37096
-
SHA1
c87fc1f864946759c4dc5dddb9ede3112651be2f
-
SHA256
0236382d957dcebb0c86dd5042603544aad75a56d4cb949f9ea045f72e0973a8
-
SHA512
bc1d17c0d5c9170ed5354e540057257a62130493976effa1b332e1f8cf8c248fb71965f83386bf7b635ecf1d7a92edf9b3428031e2d7aaeda00ebcfb1f8e2bd8
-
SSDEEP
24576:0GgVX4tJrQgpMQgL7MwUn+OItWkbVvP2LbwXoii:0t40gpMQJ+OlkNdXoii
Malware Config
Extracted
darkcomet
Random
kromoz23.no-ip.biz:1604
DC_MUTEX-Z2B25MB
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
w9R4vECN2$Gj
-
install
true
-
offline_keylogger
true
-
password
23life
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" vbc.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 44 1456 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 3160 msdcsc.exe 3508 msdcsc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2656314083-4170277356-267438488-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2656314083-4170277356-267438488-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" vbc.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 644 set thread context of 748 644 JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe 90 PID 3160 set thread context of 1928 3160 msdcsc.exe 94 PID 3508 set thread context of 4212 3508 msdcsc.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3916 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 748 vbc.exe Token: SeSecurityPrivilege 748 vbc.exe Token: SeTakeOwnershipPrivilege 748 vbc.exe Token: SeLoadDriverPrivilege 748 vbc.exe Token: SeSystemProfilePrivilege 748 vbc.exe Token: SeSystemtimePrivilege 748 vbc.exe Token: SeProfSingleProcessPrivilege 748 vbc.exe Token: SeIncBasePriorityPrivilege 748 vbc.exe Token: SeCreatePagefilePrivilege 748 vbc.exe Token: SeBackupPrivilege 748 vbc.exe Token: SeRestorePrivilege 748 vbc.exe Token: SeShutdownPrivilege 748 vbc.exe Token: SeDebugPrivilege 748 vbc.exe Token: SeSystemEnvironmentPrivilege 748 vbc.exe Token: SeChangeNotifyPrivilege 748 vbc.exe Token: SeRemoteShutdownPrivilege 748 vbc.exe Token: SeUndockPrivilege 748 vbc.exe Token: SeManageVolumePrivilege 748 vbc.exe Token: SeImpersonatePrivilege 748 vbc.exe Token: SeCreateGlobalPrivilege 748 vbc.exe Token: 33 748 vbc.exe Token: 34 748 vbc.exe Token: 35 748 vbc.exe Token: 36 748 vbc.exe Token: SeIncreaseQuotaPrivilege 1928 vbc.exe Token: SeSecurityPrivilege 1928 vbc.exe Token: SeTakeOwnershipPrivilege 1928 vbc.exe Token: SeLoadDriverPrivilege 1928 vbc.exe Token: SeSystemProfilePrivilege 1928 vbc.exe Token: SeSystemtimePrivilege 1928 vbc.exe Token: SeProfSingleProcessPrivilege 1928 vbc.exe Token: SeIncBasePriorityPrivilege 1928 vbc.exe Token: SeCreatePagefilePrivilege 1928 vbc.exe Token: SeBackupPrivilege 1928 vbc.exe Token: SeRestorePrivilege 1928 vbc.exe Token: SeShutdownPrivilege 1928 vbc.exe Token: SeDebugPrivilege 1928 vbc.exe Token: SeSystemEnvironmentPrivilege 1928 vbc.exe Token: SeChangeNotifyPrivilege 1928 vbc.exe Token: SeRemoteShutdownPrivilege 1928 vbc.exe Token: SeUndockPrivilege 1928 vbc.exe Token: SeManageVolumePrivilege 1928 vbc.exe Token: SeImpersonatePrivilege 1928 vbc.exe Token: SeCreateGlobalPrivilege 1928 vbc.exe Token: 33 1928 vbc.exe Token: 34 1928 vbc.exe Token: 35 1928 vbc.exe Token: 36 1928 vbc.exe Token: SeIncreaseQuotaPrivilege 4212 vbc.exe Token: SeSecurityPrivilege 4212 vbc.exe Token: SeTakeOwnershipPrivilege 4212 vbc.exe Token: SeLoadDriverPrivilege 4212 vbc.exe Token: SeSystemProfilePrivilege 4212 vbc.exe Token: SeSystemtimePrivilege 4212 vbc.exe Token: SeProfSingleProcessPrivilege 4212 vbc.exe Token: SeIncBasePriorityPrivilege 4212 vbc.exe Token: SeCreatePagefilePrivilege 4212 vbc.exe Token: SeBackupPrivilege 4212 vbc.exe Token: SeRestorePrivilege 4212 vbc.exe Token: SeShutdownPrivilege 4212 vbc.exe Token: SeDebugPrivilege 4212 vbc.exe Token: SeSystemEnvironmentPrivilege 4212 vbc.exe Token: SeChangeNotifyPrivilege 4212 vbc.exe Token: SeRemoteShutdownPrivilege 4212 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4212 vbc.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 644 wrote to memory of 748 644 JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe 90 PID 644 wrote to memory of 748 644 JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe 90 PID 644 wrote to memory of 748 644 JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe 90 PID 644 wrote to memory of 748 644 JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe 90 PID 644 wrote to memory of 748 644 JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe 90 PID 644 wrote to memory of 748 644 JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe 90 PID 644 wrote to memory of 748 644 JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe 90 PID 644 wrote to memory of 748 644 JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe 90 PID 644 wrote to memory of 748 644 JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe 90 PID 644 wrote to memory of 748 644 JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe 90 PID 644 wrote to memory of 748 644 JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe 90 PID 644 wrote to memory of 748 644 JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe 90 PID 644 wrote to memory of 748 644 JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe 90 PID 644 wrote to memory of 748 644 JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe 90 PID 644 wrote to memory of 748 644 JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe 90 PID 644 wrote to memory of 748 644 JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe 90 PID 748 wrote to memory of 3160 748 vbc.exe 93 PID 748 wrote to memory of 3160 748 vbc.exe 93 PID 748 wrote to memory of 3160 748 vbc.exe 93 PID 3160 wrote to memory of 1928 3160 msdcsc.exe 94 PID 3160 wrote to memory of 1928 3160 msdcsc.exe 94 PID 3160 wrote to memory of 1928 3160 msdcsc.exe 94 PID 3160 wrote to memory of 1928 3160 msdcsc.exe 94 PID 3160 wrote to memory of 1928 3160 msdcsc.exe 94 PID 3160 wrote to memory of 1928 3160 msdcsc.exe 94 PID 3160 wrote to memory of 1928 3160 msdcsc.exe 94 PID 3160 wrote to memory of 1928 3160 msdcsc.exe 94 PID 3160 wrote to memory of 1928 3160 msdcsc.exe 94 PID 3160 wrote to memory of 1928 3160 msdcsc.exe 94 PID 3160 wrote to memory of 1928 3160 msdcsc.exe 94 PID 3160 wrote to memory of 1928 3160 msdcsc.exe 94 PID 3160 wrote to memory of 1928 3160 msdcsc.exe 94 PID 3160 wrote to memory of 1928 3160 msdcsc.exe 94 PID 3160 wrote to memory of 1928 3160 msdcsc.exe 94 PID 3160 wrote to memory of 1928 3160 msdcsc.exe 94 PID 1928 wrote to memory of 3508 1928 vbc.exe 95 PID 1928 wrote to memory of 3508 1928 vbc.exe 95 PID 1928 wrote to memory of 3508 1928 vbc.exe 95 PID 3508 wrote to memory of 4212 3508 msdcsc.exe 96 PID 3508 wrote to memory of 4212 3508 msdcsc.exe 96 PID 3508 wrote to memory of 4212 3508 msdcsc.exe 96 PID 3508 wrote to memory of 4212 3508 msdcsc.exe 96 PID 3508 wrote to memory of 4212 3508 msdcsc.exe 96 PID 3508 wrote to memory of 4212 3508 msdcsc.exe 96 PID 3508 wrote to memory of 4212 3508 msdcsc.exe 96 PID 3508 wrote to memory of 4212 3508 msdcsc.exe 96 PID 3508 wrote to memory of 4212 3508 msdcsc.exe 96 PID 3508 wrote to memory of 4212 3508 msdcsc.exe 96 PID 3508 wrote to memory of 4212 3508 msdcsc.exe 96 PID 3508 wrote to memory of 4212 3508 msdcsc.exe 96 PID 3508 wrote to memory of 4212 3508 msdcsc.exe 96 PID 3508 wrote to memory of 4212 3508 msdcsc.exe 96 PID 3508 wrote to memory of 4212 3508 msdcsc.exe 96 PID 3508 wrote to memory of 4212 3508 msdcsc.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f8349d63d18628e5bcf39919ddf37096.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe4⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4212
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODM0MTAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NTUzNjg2NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1Mjc0NjUwNDQ4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3916
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116B
MD5fbcc48ddf361df41da6b0400718841f8
SHA1b6d3641dc3c8186662f3906a350e355f47e373e3
SHA256ecb300191d0e3420d114338ed6850afa649b270f75c181ffe86b435420100870
SHA5121d9d8e3335423152e7b19bc3b0ac8f04d318c342cfeb1567b9b82f0dde0e3d3f57c3fb7c312fbca7d9f46ba2383f32a2abc90df9a924f27da43f854bd490e578
-
Filesize
1.8MB
MD5f8349d63d18628e5bcf39919ddf37096
SHA1c87fc1f864946759c4dc5dddb9ede3112651be2f
SHA2560236382d957dcebb0c86dd5042603544aad75a56d4cb949f9ea045f72e0973a8
SHA512bc1d17c0d5c9170ed5354e540057257a62130493976effa1b332e1f8cf8c248fb71965f83386bf7b635ecf1d7a92edf9b3428031e2d7aaeda00ebcfb1f8e2bd8