Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 04:18
Static task
static1
Behavioral task
behavioral1
Sample
1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe
-
Size
393KB
-
MD5
1df9fece0dd4500c39dbe9544959a9b7
-
SHA1
5e3a78348a7c8227324e7c586c9f1705d9f1e042
-
SHA256
803c89efe08eb9dd7dc35bd886818e61ffa82762d75f63c9d2691dd66e703524
-
SHA512
0bce0589f10d9c76db128dd74d284fe9708f43099dd7a2827f108a82ac5116f906e4f5fb4c0892f9f00f9aa856dd6b478e9ffc7849e7a25b696aafcf9ca8a9a6
-
SSDEEP
6144:NcfcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37jNkb/XM3jxNxW0Y0zlVYFAbQ:NcfcW7KEZlPzCy37jNW/XgxNXli3
Malware Config
Extracted
darkcomet
Guest16
romanticboy.zapto.org:1604
DC_MUTEX-DJQBFWY
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
lG6FsTBjX2NM
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Extracted
latentbot
romanticboy.zapto.org
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 2060 attrib.exe 2136 attrib.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 2532 msdcsc.exe -
Loads dropped DLL 2 IoCs
Processes:
1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exepid process 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
Processes:
1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exedescription ioc process File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2804 2392 WerFault.exe notepad.exe 1064 1708 WerFault.exe notepad.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msdcsc.exepid process 2532 msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeSecurityPrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeSystemtimePrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeBackupPrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeRestorePrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeShutdownPrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeDebugPrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeUndockPrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeManageVolumePrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeImpersonatePrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: 33 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: 34 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: 35 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2532 msdcsc.exe Token: SeSecurityPrivilege 2532 msdcsc.exe Token: SeTakeOwnershipPrivilege 2532 msdcsc.exe Token: SeLoadDriverPrivilege 2532 msdcsc.exe Token: SeSystemProfilePrivilege 2532 msdcsc.exe Token: SeSystemtimePrivilege 2532 msdcsc.exe Token: SeProfSingleProcessPrivilege 2532 msdcsc.exe Token: SeIncBasePriorityPrivilege 2532 msdcsc.exe Token: SeCreatePagefilePrivilege 2532 msdcsc.exe Token: SeBackupPrivilege 2532 msdcsc.exe Token: SeRestorePrivilege 2532 msdcsc.exe Token: SeShutdownPrivilege 2532 msdcsc.exe Token: SeDebugPrivilege 2532 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2532 msdcsc.exe Token: SeChangeNotifyPrivilege 2532 msdcsc.exe Token: SeRemoteShutdownPrivilege 2532 msdcsc.exe Token: SeUndockPrivilege 2532 msdcsc.exe Token: SeManageVolumePrivilege 2532 msdcsc.exe Token: SeImpersonatePrivilege 2532 msdcsc.exe Token: SeCreateGlobalPrivilege 2532 msdcsc.exe Token: 33 2532 msdcsc.exe Token: 34 2532 msdcsc.exe Token: 35 2532 msdcsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msdcsc.exepid process 2532 msdcsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.execmd.execmd.exenotepad.exemsdcsc.exedescription pid process target process PID 2092 wrote to memory of 2928 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe cmd.exe PID 2092 wrote to memory of 2928 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe cmd.exe PID 2092 wrote to memory of 2928 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe cmd.exe PID 2092 wrote to memory of 2928 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe cmd.exe PID 2092 wrote to memory of 2180 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe cmd.exe PID 2092 wrote to memory of 2180 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe cmd.exe PID 2092 wrote to memory of 2180 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe cmd.exe PID 2092 wrote to memory of 2180 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe cmd.exe PID 2180 wrote to memory of 2060 2180 cmd.exe attrib.exe PID 2180 wrote to memory of 2060 2180 cmd.exe attrib.exe PID 2180 wrote to memory of 2060 2180 cmd.exe attrib.exe PID 2180 wrote to memory of 2060 2180 cmd.exe attrib.exe PID 2928 wrote to memory of 2136 2928 cmd.exe attrib.exe PID 2928 wrote to memory of 2136 2928 cmd.exe attrib.exe PID 2928 wrote to memory of 2136 2928 cmd.exe attrib.exe PID 2928 wrote to memory of 2136 2928 cmd.exe attrib.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2092 wrote to memory of 2392 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe notepad.exe PID 2392 wrote to memory of 2804 2392 notepad.exe WerFault.exe PID 2392 wrote to memory of 2804 2392 notepad.exe WerFault.exe PID 2392 wrote to memory of 2804 2392 notepad.exe WerFault.exe PID 2392 wrote to memory of 2804 2392 notepad.exe WerFault.exe PID 2092 wrote to memory of 2532 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe msdcsc.exe PID 2092 wrote to memory of 2532 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe msdcsc.exe PID 2092 wrote to memory of 2532 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe msdcsc.exe PID 2092 wrote to memory of 2532 2092 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe msdcsc.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe PID 2532 wrote to memory of 1708 2532 msdcsc.exe notepad.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 2060 attrib.exe 2136 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 2643⤵
- Program crash
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 1964⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
\Windows\SysWOW64\MSDCSC\msdcsc.exeFilesize
393KB
MD51df9fece0dd4500c39dbe9544959a9b7
SHA15e3a78348a7c8227324e7c586c9f1705d9f1e042
SHA256803c89efe08eb9dd7dc35bd886818e61ffa82762d75f63c9d2691dd66e703524
SHA5120bce0589f10d9c76db128dd74d284fe9708f43099dd7a2827f108a82ac5116f906e4f5fb4c0892f9f00f9aa856dd6b478e9ffc7849e7a25b696aafcf9ca8a9a6
-
memory/2092-0-0x0000000000400000-0x00000000004EE000-memory.dmpFilesize
952KB
-
memory/2092-1-0x0000000000520000-0x0000000000521000-memory.dmpFilesize
4KB
-
memory/2092-41-0x0000000004760000-0x000000000484E000-memory.dmpFilesize
952KB
-
memory/2092-85-0x0000000000400000-0x00000000004EE000-memory.dmpFilesize
952KB
-
memory/2392-5-0x00000000000C0000-0x00000000000C1000-memory.dmpFilesize
4KB
-
memory/2392-33-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/2532-43-0x0000000000400000-0x00000000004EE000-memory.dmpFilesize
952KB
-
memory/2532-88-0x0000000000400000-0x00000000004EE000-memory.dmpFilesize
952KB