Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 12:40
Static task
static1
Behavioral task
behavioral1
Sample
c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe
Resource
win10v2004-20220901-en
General
-
Target
c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe
-
Size
348KB
-
MD5
654018f6195e1af931a8ab88de19b441
-
SHA1
8749ed2f3d89011379877b237403f5e6c7a0a9ef
-
SHA256
c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391
-
SHA512
7caaaff38f8219a1088648c1933f1b5c4c1930cfdadd28d71588d4fa3a5aa4a47dc9da6c85965649a9ad54a944280e6cb2aaa793399595048eb0ef1dc08d2227
-
SSDEEP
6144:6CF0tb8Dbqz3MN2lLa5ntDgcHE6ek//Td/dn4wGup5A22wz/Pv:6PtQDbEPlLWntMcxZlLHA0z/Pv
Malware Config
Extracted
darkcomet
Guest16_min
useles.no-ip.org:400
DCMIN_MUTEX-RAVA06T
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
CCiMGGm9PEke
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
DarkComet RAT
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
AppLaunch.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\DCSCMIN\\IMDCSC.exe" AppLaunch.exe -
Executes dropped EXE 7 IoCs
Processes:
vrfauto.exeIMDCSC.exebridgemigplugin.exevrfauto.exevrfauto.exebridgemigplugin.exevrfauto.exepid process 896 vrfauto.exe 3764 IMDCSC.exe 1788 bridgemigplugin.exe 4592 vrfauto.exe 2356 vrfauto.exe 3384 bridgemigplugin.exe 1580 vrfauto.exe -
Processes:
resource yara_rule behavioral2/memory/1732-135-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1732-136-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1732-137-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1732-138-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1732-139-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/1732-147-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3548-161-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3548-163-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3548-162-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/3548-171-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2080-178-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral2/memory/2248-200-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exebridgemigplugin.execscservice.exebridgemigplugin.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation bridgemigplugin.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cscservice.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation bridgemigplugin.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
vrfauto.exevrfauto.exevrfauto.exeAppLaunch.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Sysinternals = "C:\\Users\\Admin\\AppData\\Roaming\\Skype\\vrfauto.exe" vrfauto.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Sysinternals = "C:\\Users\\Admin\\AppData\\Roaming\\Skype\\vrfauto.exe" vrfauto.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Sysinternals = "C:\\Users\\Admin\\AppData\\Roaming\\Skype\\vrfauto.exe" vrfauto.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DarkComet RAT = "C:\\Users\\Admin\\Documents\\DCSCMIN\\IMDCSC.exe" AppLaunch.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exebridgemigplugin.execscservice.exebridgemigplugin.exedescription pid process target process PID 2496 set thread context of 1732 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe AppLaunch.exe PID 1788 set thread context of 3548 1788 bridgemigplugin.exe AppLaunch.exe PID 2312 set thread context of 2080 2312 cscservice.exe AppLaunch.exe PID 3384 set thread context of 2248 3384 bridgemigplugin.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exepid process 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exepid process 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exeAppLaunch.exevrfauto.exebridgemigplugin.exeAppLaunch.execscservice.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe Token: SeIncreaseQuotaPrivilege 1732 AppLaunch.exe Token: SeSecurityPrivilege 1732 AppLaunch.exe Token: SeTakeOwnershipPrivilege 1732 AppLaunch.exe Token: SeLoadDriverPrivilege 1732 AppLaunch.exe Token: SeSystemProfilePrivilege 1732 AppLaunch.exe Token: SeSystemtimePrivilege 1732 AppLaunch.exe Token: SeProfSingleProcessPrivilege 1732 AppLaunch.exe Token: SeIncBasePriorityPrivilege 1732 AppLaunch.exe Token: SeCreatePagefilePrivilege 1732 AppLaunch.exe Token: SeBackupPrivilege 1732 AppLaunch.exe Token: SeRestorePrivilege 1732 AppLaunch.exe Token: SeShutdownPrivilege 1732 AppLaunch.exe Token: SeDebugPrivilege 1732 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 1732 AppLaunch.exe Token: SeChangeNotifyPrivilege 1732 AppLaunch.exe Token: SeRemoteShutdownPrivilege 1732 AppLaunch.exe Token: SeUndockPrivilege 1732 AppLaunch.exe Token: SeManageVolumePrivilege 1732 AppLaunch.exe Token: SeImpersonatePrivilege 1732 AppLaunch.exe Token: SeCreateGlobalPrivilege 1732 AppLaunch.exe Token: 33 1732 AppLaunch.exe Token: 34 1732 AppLaunch.exe Token: 35 1732 AppLaunch.exe Token: 36 1732 AppLaunch.exe Token: SeDebugPrivilege 896 vrfauto.exe Token: SeDebugPrivilege 1788 bridgemigplugin.exe Token: SeIncreaseQuotaPrivilege 3548 AppLaunch.exe Token: SeSecurityPrivilege 3548 AppLaunch.exe Token: SeTakeOwnershipPrivilege 3548 AppLaunch.exe Token: SeLoadDriverPrivilege 3548 AppLaunch.exe Token: SeSystemProfilePrivilege 3548 AppLaunch.exe Token: SeSystemtimePrivilege 3548 AppLaunch.exe Token: SeProfSingleProcessPrivilege 3548 AppLaunch.exe Token: SeIncBasePriorityPrivilege 3548 AppLaunch.exe Token: SeCreatePagefilePrivilege 3548 AppLaunch.exe Token: SeBackupPrivilege 3548 AppLaunch.exe Token: SeRestorePrivilege 3548 AppLaunch.exe Token: SeShutdownPrivilege 3548 AppLaunch.exe Token: SeDebugPrivilege 3548 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 3548 AppLaunch.exe Token: SeChangeNotifyPrivilege 3548 AppLaunch.exe Token: SeRemoteShutdownPrivilege 3548 AppLaunch.exe Token: SeUndockPrivilege 3548 AppLaunch.exe Token: SeManageVolumePrivilege 3548 AppLaunch.exe Token: SeImpersonatePrivilege 3548 AppLaunch.exe Token: SeCreateGlobalPrivilege 3548 AppLaunch.exe Token: 33 3548 AppLaunch.exe Token: 34 3548 AppLaunch.exe Token: 35 3548 AppLaunch.exe Token: 36 3548 AppLaunch.exe Token: SeDebugPrivilege 2312 cscservice.exe Token: SeIncreaseQuotaPrivilege 2080 AppLaunch.exe Token: SeSecurityPrivilege 2080 AppLaunch.exe Token: SeTakeOwnershipPrivilege 2080 AppLaunch.exe Token: SeLoadDriverPrivilege 2080 AppLaunch.exe Token: SeSystemProfilePrivilege 2080 AppLaunch.exe Token: SeSystemtimePrivilege 2080 AppLaunch.exe Token: SeProfSingleProcessPrivilege 2080 AppLaunch.exe Token: SeIncBasePriorityPrivilege 2080 AppLaunch.exe Token: SeCreatePagefilePrivilege 2080 AppLaunch.exe Token: SeBackupPrivilege 2080 AppLaunch.exe Token: SeRestorePrivilege 2080 AppLaunch.exe Token: SeShutdownPrivilege 2080 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
AppLaunch.exepid process 3548 AppLaunch.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exeAppLaunch.exevrfauto.exebridgemigplugin.execscservice.exevrfauto.exebridgemigplugin.exedescription pid process target process PID 2496 wrote to memory of 1732 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe AppLaunch.exe PID 2496 wrote to memory of 1732 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe AppLaunch.exe PID 2496 wrote to memory of 1732 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe AppLaunch.exe PID 2496 wrote to memory of 1732 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe AppLaunch.exe PID 2496 wrote to memory of 1732 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe AppLaunch.exe PID 2496 wrote to memory of 1732 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe AppLaunch.exe PID 2496 wrote to memory of 1732 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe AppLaunch.exe PID 2496 wrote to memory of 896 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe vrfauto.exe PID 2496 wrote to memory of 896 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe vrfauto.exe PID 2496 wrote to memory of 896 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe vrfauto.exe PID 1732 wrote to memory of 3764 1732 AppLaunch.exe IMDCSC.exe PID 1732 wrote to memory of 3764 1732 AppLaunch.exe IMDCSC.exe PID 1732 wrote to memory of 3764 1732 AppLaunch.exe IMDCSC.exe PID 896 wrote to memory of 1788 896 vrfauto.exe bridgemigplugin.exe PID 896 wrote to memory of 1788 896 vrfauto.exe bridgemigplugin.exe PID 896 wrote to memory of 1788 896 vrfauto.exe bridgemigplugin.exe PID 2496 wrote to memory of 2312 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe cscservice.exe PID 2496 wrote to memory of 2312 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe cscservice.exe PID 2496 wrote to memory of 2312 2496 c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe cscservice.exe PID 1788 wrote to memory of 3548 1788 bridgemigplugin.exe AppLaunch.exe PID 1788 wrote to memory of 3548 1788 bridgemigplugin.exe AppLaunch.exe PID 1788 wrote to memory of 3548 1788 bridgemigplugin.exe AppLaunch.exe PID 1788 wrote to memory of 3548 1788 bridgemigplugin.exe AppLaunch.exe PID 1788 wrote to memory of 3548 1788 bridgemigplugin.exe AppLaunch.exe PID 1788 wrote to memory of 3548 1788 bridgemigplugin.exe AppLaunch.exe PID 1788 wrote to memory of 3548 1788 bridgemigplugin.exe AppLaunch.exe PID 1788 wrote to memory of 4592 1788 bridgemigplugin.exe vrfauto.exe PID 1788 wrote to memory of 4592 1788 bridgemigplugin.exe vrfauto.exe PID 1788 wrote to memory of 4592 1788 bridgemigplugin.exe vrfauto.exe PID 2312 wrote to memory of 2080 2312 cscservice.exe AppLaunch.exe PID 2312 wrote to memory of 2080 2312 cscservice.exe AppLaunch.exe PID 2312 wrote to memory of 2080 2312 cscservice.exe AppLaunch.exe PID 2312 wrote to memory of 2080 2312 cscservice.exe AppLaunch.exe PID 2312 wrote to memory of 2080 2312 cscservice.exe AppLaunch.exe PID 2312 wrote to memory of 2080 2312 cscservice.exe AppLaunch.exe PID 2312 wrote to memory of 2080 2312 cscservice.exe AppLaunch.exe PID 2312 wrote to memory of 2356 2312 cscservice.exe vrfauto.exe PID 2312 wrote to memory of 2356 2312 cscservice.exe vrfauto.exe PID 2312 wrote to memory of 2356 2312 cscservice.exe vrfauto.exe PID 2356 wrote to memory of 3384 2356 vrfauto.exe bridgemigplugin.exe PID 2356 wrote to memory of 3384 2356 vrfauto.exe bridgemigplugin.exe PID 2356 wrote to memory of 3384 2356 vrfauto.exe bridgemigplugin.exe PID 3384 wrote to memory of 2248 3384 bridgemigplugin.exe AppLaunch.exe PID 3384 wrote to memory of 2248 3384 bridgemigplugin.exe AppLaunch.exe PID 3384 wrote to memory of 2248 3384 bridgemigplugin.exe AppLaunch.exe PID 3384 wrote to memory of 2248 3384 bridgemigplugin.exe AppLaunch.exe PID 3384 wrote to memory of 2248 3384 bridgemigplugin.exe AppLaunch.exe PID 3384 wrote to memory of 2248 3384 bridgemigplugin.exe AppLaunch.exe PID 3384 wrote to memory of 2248 3384 bridgemigplugin.exe AppLaunch.exe PID 3384 wrote to memory of 1580 3384 bridgemigplugin.exe vrfauto.exe PID 3384 wrote to memory of 1580 3384 bridgemigplugin.exe vrfauto.exe PID 3384 wrote to memory of 1580 3384 bridgemigplugin.exe vrfauto.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe"C:\Users\Admin\AppData\Local\Temp\c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"2⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"3⤵
- Executes dropped EXE
PID:3764 -
C:\Users\Admin\AppData\Roaming\Skype\vrfauto.exe"C:\Users\Admin\AppData\Roaming\Skype\vrfauto.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Roaming\Skype\bridgemigplugin.exeC:\Users\Admin\AppData\Roaming\Skype\bridgemigplugin.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3548 -
C:\Users\Admin\AppData\Roaming\Skype\vrfauto.exe"C:\Users\Admin\AppData\Roaming\Skype\vrfauto.exe"4⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\cscservice.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\cscservice.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2080 -
C:\Users\Admin\AppData\Roaming\Skype\vrfauto.exe"C:\Users\Admin\AppData\Roaming\Skype\vrfauto.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Roaming\Skype\bridgemigplugin.exeC:\Users\Admin\AppData\Roaming\Skype\bridgemigplugin.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"5⤵PID:2248
-
C:\Users\Admin\AppData\Roaming\Skype\vrfauto.exe"C:\Users\Admin\AppData\Roaming\Skype\vrfauto.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1580
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\bridgemigplugin.exe.logFilesize
319B
MD5824ba7b7eed8b900a98dd25129c4cd83
SHA154478770b2158000ef365591d42977cb854453a1
SHA256d182dd648c92e41cd62dccc65f130c07f0a96c03b32f907c3d1218e9aa5bda03
SHA512ae4f3a9673711ecb6cc5d06874c587341d5094803923b53b6e982278fa64549d7acf866de165e23750facd55da556b6794c0d32f129f4087529c73acd4ffb11e
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\vrfauto.exe.logFilesize
224B
MD5c19eb8c8e7a40e6b987f9d2ee952996e
SHA16fc3049855bc9100643e162511673c6df0f28bfb
SHA256677e9e30350df17e2bc20fa9f7d730e9f7cc6e870d6520a345f5f7dc5b31f58a
SHA512860713b4a787c2189ed12a47d4b68b60ac00c7a253cae52dd4eb9276dacafeae3a81906b6d0742c8ecfdfaa255777c445beb7c2a532f3c677a9903237ac97596
-
C:\Users\Admin\AppData\Roaming\Skype\bridgemigplugin.exeFilesize
348KB
MD5654018f6195e1af931a8ab88de19b441
SHA18749ed2f3d89011379877b237403f5e6c7a0a9ef
SHA256c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391
SHA5127caaaff38f8219a1088648c1933f1b5c4c1930cfdadd28d71588d4fa3a5aa4a47dc9da6c85965649a9ad54a944280e6cb2aaa793399595048eb0ef1dc08d2227
-
C:\Users\Admin\AppData\Roaming\Skype\bridgemigplugin.exeFilesize
348KB
MD5654018f6195e1af931a8ab88de19b441
SHA18749ed2f3d89011379877b237403f5e6c7a0a9ef
SHA256c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391
SHA5127caaaff38f8219a1088648c1933f1b5c4c1930cfdadd28d71588d4fa3a5aa4a47dc9da6c85965649a9ad54a944280e6cb2aaa793399595048eb0ef1dc08d2227
-
C:\Users\Admin\AppData\Roaming\Skype\bridgemigplugin.exeFilesize
348KB
MD5654018f6195e1af931a8ab88de19b441
SHA18749ed2f3d89011379877b237403f5e6c7a0a9ef
SHA256c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391
SHA5127caaaff38f8219a1088648c1933f1b5c4c1930cfdadd28d71588d4fa3a5aa4a47dc9da6c85965649a9ad54a944280e6cb2aaa793399595048eb0ef1dc08d2227
-
C:\Users\Admin\AppData\Roaming\Skype\bridgemigplugin.exeFilesize
348KB
MD5654018f6195e1af931a8ab88de19b441
SHA18749ed2f3d89011379877b237403f5e6c7a0a9ef
SHA256c6f88f6e9970a9e687ed73f78ef0a6b9f840d03d06b85db94ac8aba694a93391
SHA5127caaaff38f8219a1088648c1933f1b5c4c1930cfdadd28d71588d4fa3a5aa4a47dc9da6c85965649a9ad54a944280e6cb2aaa793399595048eb0ef1dc08d2227
-
C:\Users\Admin\AppData\Roaming\Skype\vrfauto.exeFilesize
22KB
MD5b04d351044c855fcf49ece553f8fdc0e
SHA14461b34b469d1c7e7738136b41fcf334301f6cab
SHA256eb0751bd2857fd287d5e9ec59b100cfa8fec37c2d0c62ed22e07711b4cc84301
SHA512f9a17b8d071d28713a114158ed9eb626e162d651a006618876d598ad9fb49bc6d0f0c429964b7a33f8be97dc5ebbc4503505cb143a97fe1d1a87ab3b1676c2ed
-
C:\Users\Admin\AppData\Roaming\Skype\vrfauto.exeFilesize
22KB
MD5b04d351044c855fcf49ece553f8fdc0e
SHA14461b34b469d1c7e7738136b41fcf334301f6cab
SHA256eb0751bd2857fd287d5e9ec59b100cfa8fec37c2d0c62ed22e07711b4cc84301
SHA512f9a17b8d071d28713a114158ed9eb626e162d651a006618876d598ad9fb49bc6d0f0c429964b7a33f8be97dc5ebbc4503505cb143a97fe1d1a87ab3b1676c2ed
-
C:\Users\Admin\AppData\Roaming\Skype\vrfauto.exeFilesize
22KB
MD5b04d351044c855fcf49ece553f8fdc0e
SHA14461b34b469d1c7e7738136b41fcf334301f6cab
SHA256eb0751bd2857fd287d5e9ec59b100cfa8fec37c2d0c62ed22e07711b4cc84301
SHA512f9a17b8d071d28713a114158ed9eb626e162d651a006618876d598ad9fb49bc6d0f0c429964b7a33f8be97dc5ebbc4503505cb143a97fe1d1a87ab3b1676c2ed
-
C:\Users\Admin\AppData\Roaming\Skype\vrfauto.exeFilesize
22KB
MD5b04d351044c855fcf49ece553f8fdc0e
SHA14461b34b469d1c7e7738136b41fcf334301f6cab
SHA256eb0751bd2857fd287d5e9ec59b100cfa8fec37c2d0c62ed22e07711b4cc84301
SHA512f9a17b8d071d28713a114158ed9eb626e162d651a006618876d598ad9fb49bc6d0f0c429964b7a33f8be97dc5ebbc4503505cb143a97fe1d1a87ab3b1676c2ed
-
C:\Users\Admin\AppData\Roaming\Skype\vrfauto.exeFilesize
22KB
MD5b04d351044c855fcf49ece553f8fdc0e
SHA14461b34b469d1c7e7738136b41fcf334301f6cab
SHA256eb0751bd2857fd287d5e9ec59b100cfa8fec37c2d0c62ed22e07711b4cc84301
SHA512f9a17b8d071d28713a114158ed9eb626e162d651a006618876d598ad9fb49bc6d0f0c429964b7a33f8be97dc5ebbc4503505cb143a97fe1d1a87ab3b1676c2ed
-
C:\Users\Admin\AppData\Roaming\Skype\vrfauto.exeFilesize
22KB
MD5b04d351044c855fcf49ece553f8fdc0e
SHA14461b34b469d1c7e7738136b41fcf334301f6cab
SHA256eb0751bd2857fd287d5e9ec59b100cfa8fec37c2d0c62ed22e07711b4cc84301
SHA512f9a17b8d071d28713a114158ed9eb626e162d651a006618876d598ad9fb49bc6d0f0c429964b7a33f8be97dc5ebbc4503505cb143a97fe1d1a87ab3b1676c2ed
-
C:\Users\Admin\AppData\Roaming\Skype\vrfauto.exeFilesize
22KB
MD5b04d351044c855fcf49ece553f8fdc0e
SHA14461b34b469d1c7e7738136b41fcf334301f6cab
SHA256eb0751bd2857fd287d5e9ec59b100cfa8fec37c2d0c62ed22e07711b4cc84301
SHA512f9a17b8d071d28713a114158ed9eb626e162d651a006618876d598ad9fb49bc6d0f0c429964b7a33f8be97dc5ebbc4503505cb143a97fe1d1a87ab3b1676c2ed
-
C:\Users\Admin\AppData\Roaming\Skype\vrfauto.exeFilesize
22KB
MD5b04d351044c855fcf49ece553f8fdc0e
SHA14461b34b469d1c7e7738136b41fcf334301f6cab
SHA256eb0751bd2857fd287d5e9ec59b100cfa8fec37c2d0c62ed22e07711b4cc84301
SHA512f9a17b8d071d28713a114158ed9eb626e162d651a006618876d598ad9fb49bc6d0f0c429964b7a33f8be97dc5ebbc4503505cb143a97fe1d1a87ab3b1676c2ed
-
C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exeFilesize
57KB
MD5454501a66ad6e85175a6757573d79f8b
SHA18ca96c61f26a640a5b1b1152d055260b9d43e308
SHA2567fd4f35aff4a0d4bfaae3a5dfb14b94934276df0e96d1a417a8f3693915e72c8
SHA5129dc3b9a9b7e661acc3ac9a0ff4fd764097fc41ccbc2e7969cae9805cc693a87e8255e459ea5f315271825e7e517a46649acc8d42122a8018264cc3f2efa34fb7
-
C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exeFilesize
57KB
MD5454501a66ad6e85175a6757573d79f8b
SHA18ca96c61f26a640a5b1b1152d055260b9d43e308
SHA2567fd4f35aff4a0d4bfaae3a5dfb14b94934276df0e96d1a417a8f3693915e72c8
SHA5129dc3b9a9b7e661acc3ac9a0ff4fd764097fc41ccbc2e7969cae9805cc693a87e8255e459ea5f315271825e7e517a46649acc8d42122a8018264cc3f2efa34fb7
-
memory/896-146-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/896-148-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/896-140-0x0000000000000000-mapping.dmp
-
memory/896-155-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/1580-202-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/1580-201-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/1580-197-0x0000000000000000-mapping.dmp
-
memory/1732-137-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1732-138-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1732-136-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1732-135-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1732-134-0x0000000000000000-mapping.dmp
-
memory/1732-139-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1732-147-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1788-152-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/1788-170-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/1788-153-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/1788-149-0x0000000000000000-mapping.dmp
-
memory/2080-173-0x0000000000000000-mapping.dmp
-
memory/2080-178-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2248-192-0x0000000000000000-mapping.dmp
-
memory/2248-200-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2312-190-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/2312-157-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/2312-169-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/2312-154-0x0000000000000000-mapping.dmp
-
memory/2356-183-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/2356-191-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/2356-182-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/2356-179-0x0000000000000000-mapping.dmp
-
memory/2496-132-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/2496-133-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/2496-156-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/3384-184-0x0000000000000000-mapping.dmp
-
memory/3384-188-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/3384-189-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/3548-163-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/3548-162-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/3548-161-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/3548-158-0x0000000000000000-mapping.dmp
-
memory/3548-171-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/3764-142-0x0000000000000000-mapping.dmp
-
memory/4592-164-0x0000000000000000-mapping.dmp
-
memory/4592-168-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB
-
memory/4592-172-0x00000000754F0000-0x0000000075AA1000-memory.dmpFilesize
5.7MB