Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 18:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3acce3031f682ba195b00be299647862.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3acce3031f682ba195b00be299647862.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3acce3031f682ba195b00be299647862.exe
-
Size
423KB
-
MD5
3acce3031f682ba195b00be299647862
-
SHA1
39bc0e236546e988f7be772af48788a138f7f2f8
-
SHA256
5f5b8534ff9c41325d7fc379152a22080285e9de5f369224db74c69809954d2c
-
SHA512
65acdf8f3465189a677defcc57c91fca556cf86c5a05460bf1e6fffa5766d488aae1850713fd36ea4331c038fad477335b106ccfd44be07b60ea88481b25a5fc
-
SSDEEP
12288:b8rO0n6VAJ7FMjCc7haEz9NX68U4CftbG:bl0nOGOjCc4Ez9NX6JbG
Malware Config
Extracted
darkcomet
kurvichki
37.221.162.36:1604
DC_MUTEX-DRZDKPB
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
Qt23HyB8TzSs
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" JaffaCakes118_3acce3031f682ba195b00be299647862.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe -
Windows security bypass 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation JaffaCakes118_3acce3031f682ba195b00be299647862.exe -
Executes dropped EXE 1 IoCs
pid Process 2532 msdcsc.exe -
Windows security modification 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" JaffaCakes118_3acce3031f682ba195b00be299647862.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 17 IoCs
pid pid_target Process procid_target 3080 4080 WerFault.exe 84 4740 4080 WerFault.exe 84 448 4080 WerFault.exe 84 2088 4080 WerFault.exe 84 2476 4080 WerFault.exe 84 3688 4080 WerFault.exe 84 4436 4080 WerFault.exe 84 1360 2532 WerFault.exe 106 1632 4080 WerFault.exe 84 1516 2532 WerFault.exe 106 2128 2532 WerFault.exe 106 4776 2532 WerFault.exe 106 4868 2532 WerFault.exe 106 3648 2532 WerFault.exe 106 3396 2532 WerFault.exe 106 5008 2532 WerFault.exe 106 1424 2532 WerFault.exe 106 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3acce3031f682ba195b00be299647862.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeSecurityPrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeTakeOwnershipPrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeLoadDriverPrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeSystemProfilePrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeSystemtimePrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeProfSingleProcessPrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeIncBasePriorityPrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeCreatePagefilePrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeBackupPrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeRestorePrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeShutdownPrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeDebugPrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeSystemEnvironmentPrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeChangeNotifyPrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeRemoteShutdownPrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeUndockPrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeManageVolumePrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeImpersonatePrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeCreateGlobalPrivilege 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: 33 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: 34 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: 35 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: 36 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe Token: SeIncreaseQuotaPrivilege 2532 msdcsc.exe Token: SeSecurityPrivilege 2532 msdcsc.exe Token: SeTakeOwnershipPrivilege 2532 msdcsc.exe Token: SeLoadDriverPrivilege 2532 msdcsc.exe Token: SeSystemProfilePrivilege 2532 msdcsc.exe Token: SeSystemtimePrivilege 2532 msdcsc.exe Token: SeProfSingleProcessPrivilege 2532 msdcsc.exe Token: SeIncBasePriorityPrivilege 2532 msdcsc.exe Token: SeCreatePagefilePrivilege 2532 msdcsc.exe Token: SeBackupPrivilege 2532 msdcsc.exe Token: SeRestorePrivilege 2532 msdcsc.exe Token: SeShutdownPrivilege 2532 msdcsc.exe Token: SeDebugPrivilege 2532 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2532 msdcsc.exe Token: SeChangeNotifyPrivilege 2532 msdcsc.exe Token: SeRemoteShutdownPrivilege 2532 msdcsc.exe Token: SeUndockPrivilege 2532 msdcsc.exe Token: SeManageVolumePrivilege 2532 msdcsc.exe Token: SeImpersonatePrivilege 2532 msdcsc.exe Token: SeCreateGlobalPrivilege 2532 msdcsc.exe Token: 33 2532 msdcsc.exe Token: 34 2532 msdcsc.exe Token: 35 2532 msdcsc.exe Token: 36 2532 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2532 msdcsc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4080 wrote to memory of 2532 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe 106 PID 4080 wrote to memory of 2532 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe 106 PID 4080 wrote to memory of 2532 4080 JaffaCakes118_3acce3031f682ba195b00be299647862.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3acce3031f682ba195b00be299647862.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3acce3031f682ba195b00be299647862.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 6642⤵
- Program crash
PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 11002⤵
- Program crash
PID:4740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 11642⤵
- Program crash
PID:448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 11442⤵
- Program crash
PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 12482⤵
- Program crash
PID:2476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 12442⤵
- Program crash
PID:3688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 11202⤵
- Program crash
PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"2⤵
- Modifies firewall policy service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 7563⤵
- Program crash
PID:1360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 7643⤵
- Program crash
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 8283⤵
- Program crash
PID:2128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 7643⤵
- Program crash
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 9603⤵
- Program crash
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 10163⤵
- Program crash
PID:3648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 9603⤵
- Program crash
PID:3396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 9763⤵
- Program crash
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 10003⤵
- Program crash
PID:1424
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 1522⤵
- Program crash
PID:1632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4080 -ip 40801⤵PID:2500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4080 -ip 40801⤵PID:4600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4080 -ip 40801⤵PID:3720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4080 -ip 40801⤵PID:3280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4080 -ip 40801⤵PID:1996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4080 -ip 40801⤵PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4080 -ip 40801⤵PID:972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2532 -ip 25321⤵PID:1172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4080 -ip 40801⤵PID:4148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2532 -ip 25321⤵PID:2432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2532 -ip 25321⤵PID:2244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2532 -ip 25321⤵PID:2124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2532 -ip 25321⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2532 -ip 25321⤵PID:3388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2532 -ip 25321⤵PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2532 -ip 25321⤵PID:924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2532 -ip 25321⤵PID:2424
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
423KB
MD53acce3031f682ba195b00be299647862
SHA139bc0e236546e988f7be772af48788a138f7f2f8
SHA2565f5b8534ff9c41325d7fc379152a22080285e9de5f369224db74c69809954d2c
SHA51265acdf8f3465189a677defcc57c91fca556cf86c5a05460bf1e6fffa5766d488aae1850713fd36ea4331c038fad477335b106ccfd44be07b60ea88481b25a5fc