Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-05-2022 05:17
Static task
static1
Behavioral task
behavioral1
Sample
0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe
Resource
win7-20220414-en
General
-
Target
0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe
-
Size
683KB
-
MD5
8bb19f064991f91dca466784b13e2bb3
-
SHA1
517682367ad7b45ab2f4eba49bff723f033cfc6d
-
SHA256
0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec
-
SHA512
0752b19d991542ee5834d62b614ead5cdb90b365a5fed03a830cf57761fc00c6142d40f8f0da1bee0acb90e5f3aed14afdaa25e33b9ad132dbeec1a1c3286beb
Malware Config
Extracted
darkcomet
hack
dianabol89.zapto.org:1604
DC_MUTEX-MJBT6M8
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
qtA8PLYkzZVo
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe -
Executes dropped EXE 4 IoCs
Processes:
JQDRLENE.exemsdcsc.exeJQDRLENE.exemsdcsc.exepid process 3460 JQDRLENE.exe 208 msdcsc.exe 2124 JQDRLENE.exe 2956 msdcsc.exe -
Processes:
resource yara_rule behavioral2/memory/4520-137-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4520-138-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4520-139-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4520-140-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4520-141-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4520-142-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4520-143-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/4520-157-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2956-162-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2956-163-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2956-165-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2956-166-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exemsdcsc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation msdcsc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
JQDRLENE.exeJQDRLENE.exedescription pid process target process PID 3460 set thread context of 4520 3460 JQDRLENE.exe 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe PID 2124 set thread context of 2956 2124 JQDRLENE.exe msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msdcsc.exepid process 2956 msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeSecurityPrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeTakeOwnershipPrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeLoadDriverPrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeSystemProfilePrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeSystemtimePrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeProfSingleProcessPrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeIncBasePriorityPrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeCreatePagefilePrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeBackupPrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeRestorePrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeShutdownPrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeDebugPrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeSystemEnvironmentPrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeChangeNotifyPrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeRemoteShutdownPrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeUndockPrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeManageVolumePrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeImpersonatePrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeCreateGlobalPrivilege 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: 33 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: 34 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: 35 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: 36 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe Token: SeIncreaseQuotaPrivilege 2956 msdcsc.exe Token: SeSecurityPrivilege 2956 msdcsc.exe Token: SeTakeOwnershipPrivilege 2956 msdcsc.exe Token: SeLoadDriverPrivilege 2956 msdcsc.exe Token: SeSystemProfilePrivilege 2956 msdcsc.exe Token: SeSystemtimePrivilege 2956 msdcsc.exe Token: SeProfSingleProcessPrivilege 2956 msdcsc.exe Token: SeIncBasePriorityPrivilege 2956 msdcsc.exe Token: SeCreatePagefilePrivilege 2956 msdcsc.exe Token: SeBackupPrivilege 2956 msdcsc.exe Token: SeRestorePrivilege 2956 msdcsc.exe Token: SeShutdownPrivilege 2956 msdcsc.exe Token: SeDebugPrivilege 2956 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2956 msdcsc.exe Token: SeChangeNotifyPrivilege 2956 msdcsc.exe Token: SeRemoteShutdownPrivilege 2956 msdcsc.exe Token: SeUndockPrivilege 2956 msdcsc.exe Token: SeManageVolumePrivilege 2956 msdcsc.exe Token: SeImpersonatePrivilege 2956 msdcsc.exe Token: SeCreateGlobalPrivilege 2956 msdcsc.exe Token: 33 2956 msdcsc.exe Token: 34 2956 msdcsc.exe Token: 35 2956 msdcsc.exe Token: 36 2956 msdcsc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
JQDRLENE.exeJQDRLENE.exemsdcsc.exepid process 3460 JQDRLENE.exe 2124 JQDRLENE.exe 2956 msdcsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exeJQDRLENE.exe0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.execmd.execmd.exemsdcsc.exeJQDRLENE.exemsdcsc.exedescription pid process target process PID 3488 wrote to memory of 3460 3488 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe JQDRLENE.exe PID 3488 wrote to memory of 3460 3488 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe JQDRLENE.exe PID 3488 wrote to memory of 3460 3488 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe JQDRLENE.exe PID 3460 wrote to memory of 4520 3460 JQDRLENE.exe 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe PID 3460 wrote to memory of 4520 3460 JQDRLENE.exe 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe PID 3460 wrote to memory of 4520 3460 JQDRLENE.exe 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe PID 3460 wrote to memory of 4520 3460 JQDRLENE.exe 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe PID 3460 wrote to memory of 4520 3460 JQDRLENE.exe 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe PID 3460 wrote to memory of 4520 3460 JQDRLENE.exe 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe PID 3460 wrote to memory of 4520 3460 JQDRLENE.exe 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe PID 3460 wrote to memory of 4520 3460 JQDRLENE.exe 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe PID 4520 wrote to memory of 4080 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe cmd.exe PID 4520 wrote to memory of 4080 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe cmd.exe PID 4520 wrote to memory of 4080 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe cmd.exe PID 4520 wrote to memory of 4712 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe cmd.exe PID 4520 wrote to memory of 4712 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe cmd.exe PID 4520 wrote to memory of 4712 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe cmd.exe PID 4520 wrote to memory of 780 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe notepad.exe PID 4520 wrote to memory of 780 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe notepad.exe PID 4520 wrote to memory of 780 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe notepad.exe PID 4520 wrote to memory of 780 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe notepad.exe PID 4520 wrote to memory of 780 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe notepad.exe PID 4520 wrote to memory of 780 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe notepad.exe PID 4520 wrote to memory of 780 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe notepad.exe PID 4520 wrote to memory of 780 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe notepad.exe PID 4520 wrote to memory of 780 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe notepad.exe PID 4520 wrote to memory of 780 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe notepad.exe PID 4520 wrote to memory of 780 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe notepad.exe PID 4520 wrote to memory of 780 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe notepad.exe PID 4520 wrote to memory of 780 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe notepad.exe PID 4520 wrote to memory of 780 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe notepad.exe PID 4520 wrote to memory of 780 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe notepad.exe PID 4520 wrote to memory of 780 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe notepad.exe PID 4520 wrote to memory of 780 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe notepad.exe PID 4080 wrote to memory of 3312 4080 cmd.exe attrib.exe PID 4080 wrote to memory of 3312 4080 cmd.exe attrib.exe PID 4080 wrote to memory of 3312 4080 cmd.exe attrib.exe PID 4712 wrote to memory of 4092 4712 cmd.exe attrib.exe PID 4712 wrote to memory of 4092 4712 cmd.exe attrib.exe PID 4712 wrote to memory of 4092 4712 cmd.exe attrib.exe PID 4520 wrote to memory of 208 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe msdcsc.exe PID 4520 wrote to memory of 208 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe msdcsc.exe PID 4520 wrote to memory of 208 4520 0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe msdcsc.exe PID 208 wrote to memory of 2124 208 msdcsc.exe JQDRLENE.exe PID 208 wrote to memory of 2124 208 msdcsc.exe JQDRLENE.exe PID 208 wrote to memory of 2124 208 msdcsc.exe JQDRLENE.exe PID 2124 wrote to memory of 2956 2124 JQDRLENE.exe msdcsc.exe PID 2124 wrote to memory of 2956 2124 JQDRLENE.exe msdcsc.exe PID 2124 wrote to memory of 2956 2124 JQDRLENE.exe msdcsc.exe PID 2124 wrote to memory of 2956 2124 JQDRLENE.exe msdcsc.exe PID 2124 wrote to memory of 2956 2124 JQDRLENE.exe msdcsc.exe PID 2124 wrote to memory of 2956 2124 JQDRLENE.exe msdcsc.exe PID 2124 wrote to memory of 2956 2124 JQDRLENE.exe msdcsc.exe PID 2124 wrote to memory of 2956 2124 JQDRLENE.exe msdcsc.exe PID 2956 wrote to memory of 4636 2956 msdcsc.exe notepad.exe PID 2956 wrote to memory of 4636 2956 msdcsc.exe notepad.exe PID 2956 wrote to memory of 4636 2956 msdcsc.exe notepad.exe PID 2956 wrote to memory of 4636 2956 msdcsc.exe notepad.exe PID 2956 wrote to memory of 4636 2956 msdcsc.exe notepad.exe PID 2956 wrote to memory of 4636 2956 msdcsc.exe notepad.exe PID 2956 wrote to memory of 4636 2956 msdcsc.exe notepad.exe PID 2956 wrote to memory of 4636 2956 msdcsc.exe notepad.exe PID 2956 wrote to memory of 4636 2956 msdcsc.exe notepad.exe PID 2956 wrote to memory of 4636 2956 msdcsc.exe notepad.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 3312 attrib.exe 4092 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe"C:\Users\Admin\AppData\Local\Temp\0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\HWCGYUDD\JQDRLENE.exe"C:\Users\Admin\AppData\Local\Temp\HWCGYUDD\JQDRLENE.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe"C:\Users\Admin\AppData\Local\Temp\0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe"3⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe" +s +h4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\0aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec.exe" +s +h5⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h5⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad4⤵
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\HWCGYUDD\JQDRLENE.exe"C:\Users\Admin\AppData\Local\Temp\HWCGYUDD\JQDRLENE.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad7⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HWCGYUDD\JQDRLENE.exeFilesize
964KB
MD52ee38ff20b9d582668d0ff14bde48fcf
SHA1ccd75e289a21ee01aac4878b248f877115ea5186
SHA2560df50d6001913e1ff647d4bec049e9806ea1ea4826324ce972e0a8caf5a02873
SHA5127e7c0ca12c49ef6566198f68b0eb38e8f5dfc307edbfe833781b7c981042390a87cfc00aa13cce8d0db8c49ddff4bba91009d79ff5ec3f0a398925d8c0aa6346
-
C:\Users\Admin\AppData\Local\Temp\HWCGYUDD\JQDRLENE.exeFilesize
964KB
MD52ee38ff20b9d582668d0ff14bde48fcf
SHA1ccd75e289a21ee01aac4878b248f877115ea5186
SHA2560df50d6001913e1ff647d4bec049e9806ea1ea4826324ce972e0a8caf5a02873
SHA5127e7c0ca12c49ef6566198f68b0eb38e8f5dfc307edbfe833781b7c981042390a87cfc00aa13cce8d0db8c49ddff4bba91009d79ff5ec3f0a398925d8c0aa6346
-
C:\Users\Admin\AppData\Local\Temp\HWCGYUDD\JQDRLENE.exeFilesize
964KB
MD52ee38ff20b9d582668d0ff14bde48fcf
SHA1ccd75e289a21ee01aac4878b248f877115ea5186
SHA2560df50d6001913e1ff647d4bec049e9806ea1ea4826324ce972e0a8caf5a02873
SHA5127e7c0ca12c49ef6566198f68b0eb38e8f5dfc307edbfe833781b7c981042390a87cfc00aa13cce8d0db8c49ddff4bba91009d79ff5ec3f0a398925d8c0aa6346
-
C:\Users\Admin\AppData\Local\Temp\HWCGYUDD\JQDRLENE.exeFilesize
964KB
MD52ee38ff20b9d582668d0ff14bde48fcf
SHA1ccd75e289a21ee01aac4878b248f877115ea5186
SHA2560df50d6001913e1ff647d4bec049e9806ea1ea4826324ce972e0a8caf5a02873
SHA5127e7c0ca12c49ef6566198f68b0eb38e8f5dfc307edbfe833781b7c981042390a87cfc00aa13cce8d0db8c49ddff4bba91009d79ff5ec3f0a398925d8c0aa6346
-
C:\Users\Admin\AppData\Local\Temp\HWCGYUDD\rGwUjGFilesize
251KB
MD589beea19c83fa8ba7869b6218e4d426b
SHA13e77050911a80a01f43396306b42bffa7612a0df
SHA25658a2ef01854c591089a7789f0257796a7c1385bd23fdad621d00ea50ee7de473
SHA5121e1b4e00f8c221fc8454958b531916b1f990c67074f812528c5fc79e08570a7345ccd9ec589c82e91d0c1ddb4d08c54d49c8bd17eff815a205c7af46b3a1d22d
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
683KB
MD58bb19f064991f91dca466784b13e2bb3
SHA1517682367ad7b45ab2f4eba49bff723f033cfc6d
SHA2560aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec
SHA5120752b19d991542ee5834d62b614ead5cdb90b365a5fed03a830cf57761fc00c6142d40f8f0da1bee0acb90e5f3aed14afdaa25e33b9ad132dbeec1a1c3286beb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
683KB
MD58bb19f064991f91dca466784b13e2bb3
SHA1517682367ad7b45ab2f4eba49bff723f033cfc6d
SHA2560aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec
SHA5120752b19d991542ee5834d62b614ead5cdb90b365a5fed03a830cf57761fc00c6142d40f8f0da1bee0acb90e5f3aed14afdaa25e33b9ad132dbeec1a1c3286beb
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeFilesize
683KB
MD58bb19f064991f91dca466784b13e2bb3
SHA1517682367ad7b45ab2f4eba49bff723f033cfc6d
SHA2560aff8ddb4ffe9e66e64bc83259098b2f3cceaea0524bced7751d69f6026195ec
SHA5120752b19d991542ee5834d62b614ead5cdb90b365a5fed03a830cf57761fc00c6142d40f8f0da1bee0acb90e5f3aed14afdaa25e33b9ad132dbeec1a1c3286beb
-
memory/208-149-0x0000000000000000-mapping.dmp
-
memory/780-146-0x0000000000000000-mapping.dmp
-
memory/2124-152-0x0000000000000000-mapping.dmp
-
memory/2956-166-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2956-165-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2956-163-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2956-162-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2956-158-0x0000000000000000-mapping.dmp
-
memory/3312-147-0x0000000000000000-mapping.dmp
-
memory/3460-130-0x0000000000000000-mapping.dmp
-
memory/4080-144-0x0000000000000000-mapping.dmp
-
memory/4092-148-0x0000000000000000-mapping.dmp
-
memory/4520-141-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/4520-138-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/4520-137-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/4520-157-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/4520-142-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/4520-136-0x0000000000000000-mapping.dmp
-
memory/4520-139-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/4520-140-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/4520-143-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/4636-164-0x0000000000000000-mapping.dmp
-
memory/4712-145-0x0000000000000000-mapping.dmp