Malware Analysis Report

2024-08-06 17:12

Sample ID 240420-a8qd6aca24
Target fb8e1534329adc7639e908f62b48bb52_JaffaCakes118
SHA256 e62a4691aa6400e577127e91a57a6b3a8636836b234c885099dffd90be98f072
Tags
guest16 darkcomet evasion persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e62a4691aa6400e577127e91a57a6b3a8636836b234c885099dffd90be98f072

Threat Level: Known bad

The file fb8e1534329adc7639e908f62b48bb52_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

guest16 darkcomet evasion persistence rat trojan

Modifies firewall policy service

Darkcomet

Modifies WinLogon for persistence

Darkcomet family

Sets file to hidden

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Adds Run key to start application

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Views/modifies file attributes

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-04-20 00:53

Signatures

Darkcomet family

darkcomet

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-20 00:53

Reported

2024-04-20 00:55

Platform

win7-20240215-en

Max time kernel

150s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A

Modifies firewall policy service

evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 33 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 34 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 35 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1956 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1956 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1956 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1956 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1956 wrote to memory of 2716 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1956 wrote to memory of 2716 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1956 wrote to memory of 2716 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1956 wrote to memory of 2716 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1608 wrote to memory of 3032 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 1608 wrote to memory of 3032 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 1608 wrote to memory of 3032 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 1608 wrote to memory of 3032 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2716 wrote to memory of 2540 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2716 wrote to memory of 2540 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2716 wrote to memory of 2540 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2716 wrote to memory of 2540 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 1956 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1956 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1956 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1956 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2588 wrote to memory of 2500 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 2588 wrote to memory of 2500 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 2588 wrote to memory of 2500 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 2588 wrote to memory of 2500 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 2588 wrote to memory of 2520 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\explorer.exe
PID 2588 wrote to memory of 2520 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\explorer.exe
PID 2588 wrote to memory of 2520 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\explorer.exe
PID 2588 wrote to memory of 2520 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\explorer.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2588 wrote to memory of 2400 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe" +s +h

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe" +s +h

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"

C:\Program Files (x86)\Internet Explorer\iexplore.exe

"C:\Program Files (x86)\Internet Explorer\iexplore.exe"

C:\Windows\explorer.exe

"C:\Windows\explorer.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

Network

Country Destination Domain Proto
US 8.8.8.8:53 soronopkzelite.no-ip.org udp

Files

memory/1956-0-0x0000000000260000-0x0000000000261000-memory.dmp

\Users\Admin\Documents\MSDCSC\msdcsc.exe

MD5 fb8e1534329adc7639e908f62b48bb52
SHA1 82385f786fe919ec65311c36280ec7d2de02c564
SHA256 e62a4691aa6400e577127e91a57a6b3a8636836b234c885099dffd90be98f072
SHA512 55f58d7f8698bd53c94cea21e7d98ab67cf47a1b2614b1aa19f67716691b947723d8559a54cb98f10a7a5483883accfef674c53f01c2a4ee94acc93ab0ea341f

memory/2588-11-0x00000000003E0000-0x00000000003E1000-memory.dmp

memory/2400-13-0x0000000000080000-0x0000000000081000-memory.dmp

memory/2400-38-0x0000000001E70000-0x0000000001E71000-memory.dmp

memory/1956-39-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2588-40-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2588-41-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2588-42-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2588-43-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2588-44-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2588-45-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2588-46-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2588-47-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2588-48-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2588-49-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2588-50-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2588-51-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2588-52-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2588-53-0x0000000000400000-0x00000000004CA000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-20 00:53

Reported

2024-04-20 00:55

Platform

win10v2004-20240226-en

Max time kernel

154s

Max time network

160s

Command Line

"C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A

Modifies firewall policy service

evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 5108 set thread context of 2228 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 33 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 34 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 35 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 36 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSecurityPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemtimePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeBackupPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeRestorePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1804 wrote to memory of 2192 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1804 wrote to memory of 2192 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1804 wrote to memory of 2192 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1804 wrote to memory of 3340 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1804 wrote to memory of 3340 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1804 wrote to memory of 3340 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1804 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1804 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1804 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 3340 wrote to memory of 4776 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 3340 wrote to memory of 4776 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 3340 wrote to memory of 4776 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2192 wrote to memory of 488 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2192 wrote to memory of 488 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2192 wrote to memory of 488 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 5108 wrote to memory of 2228 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 5108 wrote to memory of 2228 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 5108 wrote to memory of 2228 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 5108 wrote to memory of 2228 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 5108 wrote to memory of 2228 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 2228 wrote to memory of 1392 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe" +s +h

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp\fb8e1534329adc7639e908f62b48bb52_JaffaCakes118.exe" +s +h

C:\Program Files (x86)\Internet Explorer\iexplore.exe

"C:\Program Files (x86)\Internet Explorer\iexplore.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3972 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 42.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 170.253.116.51.in-addr.arpa udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp
US 8.8.8.8:53 soronopkzelite.no-ip.org udp

Files

memory/1804-0-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/1804-1-0x00000000023D0000-0x00000000023D1000-memory.dmp

C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

MD5 fb8e1534329adc7639e908f62b48bb52
SHA1 82385f786fe919ec65311c36280ec7d2de02c564
SHA256 e62a4691aa6400e577127e91a57a6b3a8636836b234c885099dffd90be98f072
SHA512 55f58d7f8698bd53c94cea21e7d98ab67cf47a1b2614b1aa19f67716691b947723d8559a54cb98f10a7a5483883accfef674c53f01c2a4ee94acc93ab0ea341f

memory/1804-14-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/5108-15-0x00000000006B0000-0x00000000006B1000-memory.dmp

memory/2228-16-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/5108-17-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/1392-18-0x0000000000230000-0x0000000000231000-memory.dmp