Malware Analysis Report

2024-08-06 17:11

Sample ID 240418-s9phcsab8w
Target f850a39e38c3e6d21d7b2b628333020a_JaffaCakes118
SHA256 3a22773a05dad02a825e6891e5ad6e7ad8b3bd1e6dadbc2d74b126be98a67c28
Tags
darkcomet guest16 evasion persistence rat trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3a22773a05dad02a825e6891e5ad6e7ad8b3bd1e6dadbc2d74b126be98a67c28

Threat Level: Known bad

The file f850a39e38c3e6d21d7b2b628333020a_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

darkcomet guest16 evasion persistence rat trojan upx

Modifies WinLogon for persistence

Darkcomet

Windows security bypass

Disables RegEdit via registry modification

Executes dropped EXE

Windows security modification

UPX packed file

Loads dropped DLL

Legitimate hosting services abused for malware hosting/C2

Adds Run key to start application

Enumerates physical storage devices

Unsigned PE

Program crash

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-04-18 15:50

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-18 15:49

Reported

2024-04-18 15:52

Platform

win7-20240221-en

Max time kernel

144s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f850a39e38c3e6d21d7b2b628333020a_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Disables RegEdit via registry modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A 6.tcp.ngrok.io N/A N/A
N/A 6.tcp.ngrok.io N/A N/A
N/A 6.tcp.ngrok.io N/A N/A
N/A 6.tcp.ngrok.io N/A N/A

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: 33 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: 34 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: 35 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1504 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\f850a39e38c3e6d21d7b2b628333020a_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe
PID 1504 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\f850a39e38c3e6d21d7b2b628333020a_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe
PID 1504 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\f850a39e38c3e6d21d7b2b628333020a_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe
PID 1504 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\f850a39e38c3e6d21d7b2b628333020a_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe
PID 1504 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\f850a39e38c3e6d21d7b2b628333020a_JaffaCakes118.exe C:\Windows\SysWOW64\WerFault.exe
PID 1504 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\f850a39e38c3e6d21d7b2b628333020a_JaffaCakes118.exe C:\Windows\SysWOW64\WerFault.exe
PID 1504 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\f850a39e38c3e6d21d7b2b628333020a_JaffaCakes118.exe C:\Windows\SysWOW64\WerFault.exe
PID 1504 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\f850a39e38c3e6d21d7b2b628333020a_JaffaCakes118.exe C:\Windows\SysWOW64\WerFault.exe
PID 3004 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
PID 3004 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
PID 3004 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
PID 3004 wrote to memory of 2724 N/A C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe

Processes

C:\Users\Admin\AppData\Local\Temp\f850a39e38c3e6d21d7b2b628333020a_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\f850a39e38c3e6d21d7b2b628333020a_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe

"C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 908

C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe

"C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 6.tcp.ngrok.io udp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 8.8.8.8:53 6.tcp.ngrok.io udp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 3.141.177.1:14681 6.tcp.ngrok.io tcp
US 8.8.8.8:53 6.tcp.ngrok.io udp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 8.8.8.8:53 6.tcp.ngrok.io udp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp
US 18.189.106.45:14681 6.tcp.ngrok.io tcp

Files

memory/1504-0-0x0000000000030000-0x0000000000186000-memory.dmp

memory/1504-1-0x0000000074D80000-0x000000007546E000-memory.dmp

\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\TWPH..exe

MD5 a542755854f940253e449ce4b425cdd0
SHA1 600bd1c852a10f33df7711d5c1c29049bada4640
SHA256 890a30612c41a78eb4781d6278ea4f636d5ecf55343c5fbd87a1cf064104bcdc
SHA512 754f18537de765752afed8dc003c94df163d81f4c4ec6005a4021bbea6ec0989935f398faf94945d875170c50156e1901723f1988c78c907ce66cb93ef47c24f

memory/1504-9-0x0000000004F40000-0x0000000004FF7000-memory.dmp

memory/3004-11-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/3004-13-0x0000000000240000-0x0000000000241000-memory.dmp

memory/3004-19-0x0000000004F90000-0x0000000005047000-memory.dmp

memory/3004-25-0x0000000004F90000-0x0000000005047000-memory.dmp

memory/2724-29-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/2724-27-0x0000000000240000-0x0000000000241000-memory.dmp

memory/3004-30-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/1504-31-0x0000000074D80000-0x000000007546E000-memory.dmp

memory/1504-32-0x0000000004F40000-0x0000000004FF7000-memory.dmp

memory/2724-33-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/1504-34-0x0000000004F40000-0x0000000004FF7000-memory.dmp

memory/2724-36-0x0000000000400000-0x00000000004B7000-memory.dmp

memory/2724-38-0x0000000000400000-0x00000000004B7000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-18 15:49

Reported

2024-04-18 15:52

Platform

win10v2004-20240412-en

Max time kernel

149s

Max time network

113s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f850a39e38c3e6d21d7b2b628333020a_JaffaCakes118.exe"

Signatures

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\f850a39e38c3e6d21d7b2b628333020a_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\f850a39e38c3e6d21d7b2b628333020a_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 69.77.216.23.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 67.32.209.4.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp

Files

memory/4560-0-0x0000000000010000-0x0000000000166000-memory.dmp

memory/4560-1-0x0000000074C00000-0x00000000753B0000-memory.dmp

memory/4560-6-0x0000000074C00000-0x00000000753B0000-memory.dmp