Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 18:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3acce3031f682ba195b00be299647862.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3acce3031f682ba195b00be299647862.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3acce3031f682ba195b00be299647862.exe
-
Size
423KB
-
MD5
3acce3031f682ba195b00be299647862
-
SHA1
39bc0e236546e988f7be772af48788a138f7f2f8
-
SHA256
5f5b8534ff9c41325d7fc379152a22080285e9de5f369224db74c69809954d2c
-
SHA512
65acdf8f3465189a677defcc57c91fca556cf86c5a05460bf1e6fffa5766d488aae1850713fd36ea4331c038fad477335b106ccfd44be07b60ea88481b25a5fc
-
SSDEEP
12288:b8rO0n6VAJ7FMjCc7haEz9NX68U4CftbG:bl0nOGOjCc4Ez9NX6JbG
Malware Config
Extracted
darkcomet
kurvichki
37.221.162.36:1604
DC_MUTEX-DRZDKPB
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
Qt23HyB8TzSs
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" JaffaCakes118_3acce3031f682ba195b00be299647862.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe -
Windows security bypass 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Executes dropped EXE 1 IoCs
pid Process 2500 msdcsc.exe -
Loads dropped DLL 2 IoCs
pid Process 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" JaffaCakes118_3acce3031f682ba195b00be299647862.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3acce3031f682ba195b00be299647862.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeSecurityPrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeTakeOwnershipPrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeLoadDriverPrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeSystemProfilePrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeSystemtimePrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeProfSingleProcessPrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeIncBasePriorityPrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeCreatePagefilePrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeBackupPrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeRestorePrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeShutdownPrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeDebugPrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeSystemEnvironmentPrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeChangeNotifyPrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeRemoteShutdownPrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeUndockPrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeManageVolumePrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeImpersonatePrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeCreateGlobalPrivilege 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: 33 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: 34 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: 35 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeIncreaseQuotaPrivilege 2500 msdcsc.exe Token: SeSecurityPrivilege 2500 msdcsc.exe Token: SeTakeOwnershipPrivilege 2500 msdcsc.exe Token: SeLoadDriverPrivilege 2500 msdcsc.exe Token: SeSystemProfilePrivilege 2500 msdcsc.exe Token: SeSystemtimePrivilege 2500 msdcsc.exe Token: SeProfSingleProcessPrivilege 2500 msdcsc.exe Token: SeIncBasePriorityPrivilege 2500 msdcsc.exe Token: SeCreatePagefilePrivilege 2500 msdcsc.exe Token: SeBackupPrivilege 2500 msdcsc.exe Token: SeRestorePrivilege 2500 msdcsc.exe Token: SeShutdownPrivilege 2500 msdcsc.exe Token: SeDebugPrivilege 2500 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2500 msdcsc.exe Token: SeChangeNotifyPrivilege 2500 msdcsc.exe Token: SeRemoteShutdownPrivilege 2500 msdcsc.exe Token: SeUndockPrivilege 2500 msdcsc.exe Token: SeManageVolumePrivilege 2500 msdcsc.exe Token: SeImpersonatePrivilege 2500 msdcsc.exe Token: SeCreateGlobalPrivilege 2500 msdcsc.exe Token: 33 2500 msdcsc.exe Token: 34 2500 msdcsc.exe Token: 35 2500 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2500 msdcsc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2500 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe 30 PID 2324 wrote to memory of 2500 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe 30 PID 2324 wrote to memory of 2500 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe 30 PID 2324 wrote to memory of 2500 2324 JaffaCakes118_3acce3031f682ba195b00be299647862.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3acce3031f682ba195b00be299647862.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3acce3031f682ba195b00be299647862.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"2⤵
- Modifies firewall policy service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
423KB
MD53acce3031f682ba195b00be299647862
SHA139bc0e236546e988f7be772af48788a138f7f2f8
SHA2565f5b8534ff9c41325d7fc379152a22080285e9de5f369224db74c69809954d2c
SHA51265acdf8f3465189a677defcc57c91fca556cf86c5a05460bf1e6fffa5766d488aae1850713fd36ea4331c038fad477335b106ccfd44be07b60ea88481b25a5fc