Malware Analysis Report

2024-08-06 19:29

Sample ID 240510-f8vlrsdg31
Target 2d9714edff846b0f84a8ee626fd26896_JaffaCakes118
SHA256 edf7a365e594729cb046b5c335176d52084e818f1784bd7d9b563a8dbad052ad
Tags
darkcomet persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

edf7a365e594729cb046b5c335176d52084e818f1784bd7d9b563a8dbad052ad

Threat Level: Known bad

The file 2d9714edff846b0f84a8ee626fd26896_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

darkcomet persistence rat trojan

Darkcomet family

Darkcomet

Modifies WinLogon for persistence

Loads dropped DLL

Checks computer location settings

Executes dropped EXE

Adds Run key to start application

Drops file in Windows directory

Enumerates physical storage devices

Unsigned PE

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Runs ping.exe

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-10 05:33

Signatures

Darkcomet family

darkcomet

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-10 05:33

Reported

2024-05-10 05:35

Platform

win10v2004-20240508-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2d9714edff846b0f84a8ee626fd26896_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
N/A N/A C:\Windows\MSDCSC\msdcsc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Windows\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Windows\\MSDCSC\\msdcsc.exe" C:\Windows\MSDCSC\msdcsc.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\MSDCSC\msdcsc.exe C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
File opened for modification C:\Windows\MSDCSC\msdcsc.exe C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
File opened for modification C:\Windows\MSDCSC\ C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A

Enumerates physical storage devices

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\PING.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: 33 N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: 34 N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: 35 N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: 36 N/A C:\Windows\MSDCSC\msdcsc.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\MSDCSC\msdcsc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3104 wrote to memory of 4612 N/A C:\Users\Admin\AppData\Local\Temp\2d9714edff846b0f84a8ee626fd26896_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe
PID 3104 wrote to memory of 4612 N/A C:\Users\Admin\AppData\Local\Temp\2d9714edff846b0f84a8ee626fd26896_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe
PID 3104 wrote to memory of 4612 N/A C:\Users\Admin\AppData\Local\Temp\2d9714edff846b0f84a8ee626fd26896_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe
PID 4612 wrote to memory of 3476 N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe C:\Windows\MSDCSC\msdcsc.exe
PID 4612 wrote to memory of 3476 N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe C:\Windows\MSDCSC\msdcsc.exe
PID 4612 wrote to memory of 3476 N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe C:\Windows\MSDCSC\msdcsc.exe
PID 4612 wrote to memory of 2256 N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe C:\Windows\SysWOW64\cmd.exe
PID 4612 wrote to memory of 2256 N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe C:\Windows\SysWOW64\cmd.exe
PID 4612 wrote to memory of 2256 N/A C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe C:\Windows\SysWOW64\cmd.exe
PID 2256 wrote to memory of 4444 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2256 wrote to memory of 4444 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2256 wrote to memory of 4444 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\2d9714edff846b0f84a8ee626fd26896_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\2d9714edff846b0f84a8ee626fd26896_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe

C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe

C:\Windows\MSDCSC\msdcsc.exe

"C:\Windows\MSDCSC\msdcsc.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe"

C:\Windows\SysWOW64\PING.EXE

ping 127.0.0.1 -n 5

Network

Country Destination Domain Proto
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 17.14.97.104.in-addr.arpa udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 spammer221.no-ip.org udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp

Files

memory/3104-3-0x0000000000400000-0x0000000000422000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tle0E57418D.exe

MD5 55381d429466565ec99dc43e24b2285c
SHA1 24cb8635cf641fec22b8c3d4790e96ab8e96298d
SHA256 dee3b2b643025ead5fe67543fe324183c4432103ac454f02652ce2f8210fe1af
SHA512 7609f4cd0c98150a5b09fb816e11663539fbd434de9f937c327994cbedb6ec28d49e9b0eca217a4d8aea1bbbbb97525e975bef01f40ceb29ec36f86c576128ba

memory/4612-5-0x0000000002190000-0x0000000002191000-memory.dmp

memory/4612-16-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/3476-17-0x0000000002180000-0x0000000002181000-memory.dmp

memory/3476-18-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/3476-19-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/3476-20-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/3476-21-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/3476-22-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/3476-23-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/3476-24-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/3476-25-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/3476-26-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/3476-27-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/3476-28-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/3476-29-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/3476-30-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/3476-31-0x0000000000400000-0x00000000004CC000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-10 05:33

Reported

2024-05-10 05:35

Platform

win7-20240419-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2d9714edff846b0f84a8ee626fd26896_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
N/A N/A C:\Windows\MSDCSC\msdcsc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Windows\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Windows\\MSDCSC\\msdcsc.exe" C:\Windows\MSDCSC\msdcsc.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\MSDCSC\ C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
File created C:\Windows\MSDCSC\msdcsc.exe C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
File opened for modification C:\Windows\MSDCSC\msdcsc.exe C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A

Enumerates physical storage devices

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\PING.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: 33 N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: 34 N/A C:\Windows\MSDCSC\msdcsc.exe N/A
Token: 35 N/A C:\Windows\MSDCSC\msdcsc.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\MSDCSC\msdcsc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1740 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\2d9714edff846b0f84a8ee626fd26896_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe
PID 1740 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\2d9714edff846b0f84a8ee626fd26896_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe
PID 1740 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\2d9714edff846b0f84a8ee626fd26896_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe
PID 1740 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\2d9714edff846b0f84a8ee626fd26896_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe
PID 2036 wrote to memory of 2108 N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe C:\Windows\MSDCSC\msdcsc.exe
PID 2036 wrote to memory of 2108 N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe C:\Windows\MSDCSC\msdcsc.exe
PID 2036 wrote to memory of 2108 N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe C:\Windows\MSDCSC\msdcsc.exe
PID 2036 wrote to memory of 2108 N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe C:\Windows\MSDCSC\msdcsc.exe
PID 2036 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe C:\Windows\SysWOW64\cmd.exe
PID 2036 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe C:\Windows\SysWOW64\cmd.exe
PID 2036 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe C:\Windows\SysWOW64\cmd.exe
PID 2036 wrote to memory of 2616 N/A C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe C:\Windows\SysWOW64\cmd.exe
PID 2616 wrote to memory of 2732 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2616 wrote to memory of 2732 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2616 wrote to memory of 2732 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2616 wrote to memory of 2732 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\2d9714edff846b0f84a8ee626fd26896_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\2d9714edff846b0f84a8ee626fd26896_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe

C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe

C:\Windows\MSDCSC\msdcsc.exe

"C:\Windows\MSDCSC\msdcsc.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Users\Admin\AppData\Local\Temp\tle0F761600.exe"

C:\Windows\SysWOW64\PING.EXE

ping 127.0.0.1 -n 5

Network

Country Destination Domain Proto
US 8.8.8.8:53 jsk.no-ip.info udp
US 8.8.8.8:53 spammer221.no-ip.org udp

Files

\Users\Admin\AppData\Local\Temp\tle0F761600.exe

MD5 55381d429466565ec99dc43e24b2285c
SHA1 24cb8635cf641fec22b8c3d4790e96ab8e96298d
SHA256 dee3b2b643025ead5fe67543fe324183c4432103ac454f02652ce2f8210fe1af
SHA512 7609f4cd0c98150a5b09fb816e11663539fbd434de9f937c327994cbedb6ec28d49e9b0eca217a4d8aea1bbbbb97525e975bef01f40ceb29ec36f86c576128ba

memory/1740-7-0x0000000000400000-0x0000000000422000-memory.dmp

memory/2036-9-0x0000000000270000-0x0000000000271000-memory.dmp

memory/2108-22-0x0000000000260000-0x0000000000261000-memory.dmp

memory/2036-23-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/2108-24-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/2108-25-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/2108-26-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/2108-27-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/2108-28-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/2108-29-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/2108-30-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/2108-31-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/2108-32-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/2108-33-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/2108-34-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/2108-35-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/2108-36-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/2108-37-0x0000000000400000-0x00000000004CC000-memory.dmp