Analysis
-
max time kernel
64s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 07:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe
-
Size
1.0MB
-
MD5
37969e3e1072e63d7b7cb3a4589da868
-
SHA1
7322c4e785f823a88bac1a1905b6a9552a813ff6
-
SHA256
bffdb13b50fb76a4e85e4e027e166271dbe2cc9ccaf19fbff4ba8cfeeb6ea297
-
SHA512
9b20b52d83a740cea6f7757c71d8b6a218f4b179c44d32487fd7127d2e3701bcc67d211840c214e5986f609e18ba33d01a271f8f163a45e2108935d1d475046d
-
SSDEEP
12288:YPUrHQD3AQlabjnJnIP5BfjdXmwmwGsqp/UAQQf9y0yaln2qnqGG41I9SOHlhCUC:YsTjTNebdhmMov1Cc0zdQL98hpyX
Malware Config
Extracted
darkcomet
Guest16
drkcmt.no-ip.org:1604
DC_MUTEX-XRH4NSY
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
WY7jPoPv6hlA
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" vbc.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2208 attrib.exe 2640 attrib.exe -
Executes dropped EXE 1 IoCs
pid Process 3028 msdcsc.exe -
Loads dropped DLL 1 IoCs
pid Process 1492 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1680 set thread context of 1492 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 33 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727 attrib.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe attrib.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1492 vbc.exe Token: SeSecurityPrivilege 1492 vbc.exe Token: SeTakeOwnershipPrivilege 1492 vbc.exe Token: SeLoadDriverPrivilege 1492 vbc.exe Token: SeSystemProfilePrivilege 1492 vbc.exe Token: SeSystemtimePrivilege 1492 vbc.exe Token: SeProfSingleProcessPrivilege 1492 vbc.exe Token: SeIncBasePriorityPrivilege 1492 vbc.exe Token: SeCreatePagefilePrivilege 1492 vbc.exe Token: SeBackupPrivilege 1492 vbc.exe Token: SeRestorePrivilege 1492 vbc.exe Token: SeShutdownPrivilege 1492 vbc.exe Token: SeDebugPrivilege 1492 vbc.exe Token: SeSystemEnvironmentPrivilege 1492 vbc.exe Token: SeChangeNotifyPrivilege 1492 vbc.exe Token: SeRemoteShutdownPrivilege 1492 vbc.exe Token: SeUndockPrivilege 1492 vbc.exe Token: SeManageVolumePrivilege 1492 vbc.exe Token: SeImpersonatePrivilege 1492 vbc.exe Token: SeCreateGlobalPrivilege 1492 vbc.exe Token: 33 1492 vbc.exe Token: 34 1492 vbc.exe Token: 35 1492 vbc.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2932 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 30 PID 1680 wrote to memory of 2932 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 30 PID 1680 wrote to memory of 2932 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 30 PID 1680 wrote to memory of 2932 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 30 PID 2932 wrote to memory of 2876 2932 csc.exe 32 PID 2932 wrote to memory of 2876 2932 csc.exe 32 PID 2932 wrote to memory of 2876 2932 csc.exe 32 PID 2932 wrote to memory of 2876 2932 csc.exe 32 PID 1680 wrote to memory of 1492 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 33 PID 1680 wrote to memory of 1492 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 33 PID 1680 wrote to memory of 1492 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 33 PID 1680 wrote to memory of 1492 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 33 PID 1680 wrote to memory of 1492 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 33 PID 1680 wrote to memory of 1492 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 33 PID 1680 wrote to memory of 1492 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 33 PID 1680 wrote to memory of 1492 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 33 PID 1680 wrote to memory of 1492 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 33 PID 1680 wrote to memory of 1492 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 33 PID 1680 wrote to memory of 1492 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 33 PID 1680 wrote to memory of 1492 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 33 PID 1680 wrote to memory of 1492 1680 JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe 33 PID 1492 wrote to memory of 2836 1492 vbc.exe 34 PID 1492 wrote to memory of 2836 1492 vbc.exe 34 PID 1492 wrote to memory of 2836 1492 vbc.exe 34 PID 1492 wrote to memory of 2836 1492 vbc.exe 34 PID 1492 wrote to memory of 2704 1492 vbc.exe 35 PID 1492 wrote to memory of 2704 1492 vbc.exe 35 PID 1492 wrote to memory of 2704 1492 vbc.exe 35 PID 1492 wrote to memory of 2704 1492 vbc.exe 35 PID 2704 wrote to memory of 2208 2704 cmd.exe 38 PID 2704 wrote to memory of 2208 2704 cmd.exe 38 PID 2704 wrote to memory of 2208 2704 cmd.exe 38 PID 2704 wrote to memory of 2208 2704 cmd.exe 38 PID 2836 wrote to memory of 2640 2836 cmd.exe 39 PID 2836 wrote to memory of 2640 2836 cmd.exe 39 PID 2836 wrote to memory of 2640 2836 cmd.exe 39 PID 2836 wrote to memory of 2640 2836 cmd.exe 39 PID 1492 wrote to memory of 3028 1492 vbc.exe 40 PID 1492 wrote to memory of 3028 1492 vbc.exe 40 PID 1492 wrote to memory of 3028 1492 vbc.exe 40 PID 1492 wrote to memory of 3028 1492 vbc.exe 40 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2208 attrib.exe 2640 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uthv5ulj\uthv5ulj.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES67D7.tmp" "c:\Users\Admin\AppData\Local\Temp\uthv5ulj\CSC611A5B993A8748969C5B7492A1C03C21.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" +s +h4⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2640
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h4⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2208
-
-
-
C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe"C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3028
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
Filesize
1KB
MD555ac2fa1c8ec9bd874b7637526af95bd
SHA10be19a8e6cacbdd24bd3418553ca00d1ed5524ac
SHA25659f1287bcdd3c0670fdd60166301c640d6510c0ae3f6dd7527bd50fdc762244d
SHA512ce62b2cf0a26a227ac626bdd3d046a3a65f60fbeb6b7a4d0374202e1f290d23de8ad8b43a09cbd28994a0f52c853d2ac32180c176b6a84180950abc8f556405c
-
Filesize
5KB
MD59c9f86d31abc94dc2a450c2f957caba1
SHA1aafa44781d8ed3ab7b975ea6f5ecd81d4a40f813
SHA256b169ca4c43ad0fb39e8298e4d6b0dc601dd9acca1096389fba11d94ba795d7e9
SHA512f7847b9e07d12d11999b990f7e6b89e3e3117ba4d1e2d30c040f34c6ca20ec51717d767c4d84f823de025dbcc80fcb2c8276702a9c42868fe420bd66a71949c2
-
Filesize
652B
MD567674598d46ac43798275c4db02cf508
SHA1051f140f2fba34cdb9c6e9b0bb418a566e5259a1
SHA256ea6b4c99394a5f52773ff75744f75901dfa53a08e3d12fbfb453f44403ab4b04
SHA512bfcbe48dec5d5208a15cfe427a5e93c4c0ee71288f1aa9a095b9768933304e06d5719c5373307696964610ef77d814eefc0263c92c7160380fc4df1ceb6d6197
-
Filesize
4KB
MD5f60a1218bfdab4f9b0176d4e1a15ec68
SHA12222a76846b6caf120589f7120a5a41f8811761d
SHA256fa9031f18b423c4d078667222b009f1d285149b93d60029feab549fc6d46a927
SHA512c082a09f8e8b20776d5d1397b6a781c293df15a421c1f93e069df8df8fe59580100c7347deef3185c8104ecce2eae6fabfc44994805d21a23123a6a9cd763bc6
-
Filesize
224B
MD5a3d3552b879688f2de8596c2c146afd4
SHA13ce4d602ea4f163b97c572c5f9a830494b78b35e
SHA256ae002cee780c9d95b723c51ccd92565a9ffe6906de98a0254c4e1c17176096d8
SHA512cbeff8adc53b6456dfa0123b0d002a62510c4a3484334c582127bbaa978c850670815c64b08e91eb815c20f2df43453201a4336eb086cc81f155fe811b34ac98