Malware Analysis Report

2024-08-06 19:31

Sample ID 240518-ysjtfadd66
Target 2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a
SHA256 2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a
Tags
upx darkcomet persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a

Threat Level: Known bad

The file 2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a was found to be: Known bad.

Malicious Activity Summary

upx darkcomet persistence rat trojan

Darkcomet

UPX dump on OEP (original entry point)

UPX dump on OEP (original entry point)

Loads dropped DLL

Checks computer location settings

UPX packed file

Checks BIOS information in registry

Executes dropped EXE

Adds Run key to start application

Suspicious use of SetThreadContext

Enumerates physical storage devices

Unsigned PE

Enumerates system info in registry

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Checks processor information in registry

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-18 20:02

Signatures

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-18 20:02

Reported

2024-05-18 20:05

Platform

win7-20240221-en

Max time kernel

149s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe"

Signatures

Darkcomet

trojan rat darkcomet

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mcrosoft = "C:\\Users\\Admin\\AppData\\Roaming\\mcsft.exe" C:\Windows\SysWOW64\reg.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2684 set thread context of 2544 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2924 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe C:\Windows\SysWOW64\cmd.exe
PID 2924 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe C:\Windows\SysWOW64\cmd.exe
PID 2924 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe C:\Windows\SysWOW64\cmd.exe
PID 2924 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2568 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2876 wrote to memory of 2568 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2876 wrote to memory of 2568 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2876 wrote to memory of 2568 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2924 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2924 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2924 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2924 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2684 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2684 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2684 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2684 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2684 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2684 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2684 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2684 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 2684 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe

Processes

C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe

"C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\lIXfW.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Mcrosoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\mcsft.exe" /f

C:\Users\Admin\AppData\Roaming\mcsft.exe

"C:\Users\Admin\AppData\Roaming\mcsft.exe"

C:\Users\Admin\AppData\Roaming\mcsft.exe

C:\Users\Admin\AppData\Roaming\mcsft.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 letsgoboom.no-ip.info udp

Files

memory/2924-0-0x0000000000400000-0x00000000007C8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\lIXfW.bat

MD5 a5feca573884d76f559b996d45e8ad9a
SHA1 0e81a993f3af4e31d60653dc2513186f0495f1c8
SHA256 c98e20d46d6465febb5d29cfab51241521ea5d6cd621f5e18b9b7d6fbfac3f0f
SHA512 a9239648b5f15eac4d4151b6e1bdc81065eeaeb101404c2a0126f03bc87f1e6a57206bfa07a44379e9d3bba889e4497a9991ff41fb109099b01512df3dc3cbda

C:\Users\Admin\AppData\Roaming\mcsft.exe

MD5 fbede359be9d473035e51f4ab9b01063
SHA1 825ea8c1af75179d4b9b555061f4a7f4de67c89b
SHA256 c095b30b9458a0739d6534aab7c30b9105c660bb8a3a84d7d7c3af02c48c5089
SHA512 039a7f8adc6aa9d1f3b832510ad835252f889f149532299013f7c2c756edab17859f4c3c4415d9e52f503df7c0632827a9d7af6904362a9cb180a8ea0b96b479

memory/2684-46-0x0000000000400000-0x00000000007C8000-memory.dmp

memory/2924-45-0x0000000003940000-0x0000000003D08000-memory.dmp

memory/2924-44-0x0000000000400000-0x00000000007C8000-memory.dmp

memory/2544-57-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-56-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2684-55-0x0000000000400000-0x00000000007C8000-memory.dmp

memory/2544-58-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-59-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-54-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-63-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-62-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-61-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-60-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-51-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-64-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2924-65-0x0000000003940000-0x0000000003D08000-memory.dmp

memory/2544-66-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-67-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-68-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-69-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-70-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-71-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-72-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-73-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-74-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-75-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-76-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-77-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-78-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-79-0x0000000000400000-0x00000000004B5000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-18 20:02

Reported

2024-05-18 20:05

Platform

win10v2004-20240426-en

Max time kernel

150s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe"

Signatures

Darkcomet

trojan rat darkcomet

UPX dump on OEP (original entry point)

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mcrosoft = "C:\\Users\\Admin\\AppData\\Roaming\\mcsft.exe" C:\Windows\SysWOW64\reg.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1852 set thread context of 4556 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3672 wrote to memory of 2420 N/A C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe C:\Windows\SysWOW64\cmd.exe
PID 3672 wrote to memory of 2420 N/A C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe C:\Windows\SysWOW64\cmd.exe
PID 3672 wrote to memory of 2420 N/A C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe C:\Windows\SysWOW64\cmd.exe
PID 2420 wrote to memory of 4904 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2420 wrote to memory of 4904 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2420 wrote to memory of 4904 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3672 wrote to memory of 1852 N/A C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 3672 wrote to memory of 1852 N/A C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 3672 wrote to memory of 1852 N/A C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1852 wrote to memory of 4556 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1852 wrote to memory of 4556 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1852 wrote to memory of 4556 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1852 wrote to memory of 4556 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1852 wrote to memory of 4556 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1852 wrote to memory of 4556 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1852 wrote to memory of 4556 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe
PID 1852 wrote to memory of 4556 N/A C:\Users\Admin\AppData\Roaming\mcsft.exe C:\Users\Admin\AppData\Roaming\mcsft.exe

Processes

C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe

"C:\Users\Admin\AppData\Local\Temp\2eaa11604d593c1f1a7493f0e9d5e0523c156b5c53c5dccd6c5e2f925309cd2a.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TDnMH.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Mcrosoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\mcsft.exe" /f

C:\Users\Admin\AppData\Roaming\mcsft.exe

"C:\Users\Admin\AppData\Roaming\mcsft.exe"

C:\Users\Admin\AppData\Roaming\mcsft.exe

C:\Users\Admin\AppData\Roaming\mcsft.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.75:443 www.bing.com tcp
US 8.8.8.8:53 75.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
NL 23.62.61.75:443 www.bing.com tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 216.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 letsgoboom.no-ip.info udp
US 8.8.8.8:53 6.173.189.20.in-addr.arpa udp

Files

memory/3672-0-0x0000000000400000-0x00000000007C8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\TDnMH.txt

MD5 a5feca573884d76f559b996d45e8ad9a
SHA1 0e81a993f3af4e31d60653dc2513186f0495f1c8
SHA256 c98e20d46d6465febb5d29cfab51241521ea5d6cd621f5e18b9b7d6fbfac3f0f
SHA512 a9239648b5f15eac4d4151b6e1bdc81065eeaeb101404c2a0126f03bc87f1e6a57206bfa07a44379e9d3bba889e4497a9991ff41fb109099b01512df3dc3cbda

C:\Users\Admin\AppData\Roaming\mcsft.txt

MD5 16e862a40228299acd98cbd560b08c64
SHA1 251cf6394139c3eb60f6def641b9312f8eacd3a0
SHA256 4cba560dacdd0573f2040558121c07adaa8fa5f483a3ae189f352e0349b4a16e
SHA512 d08550377ca366c853803ba2da0fd4dd087bd917ae46fdcc80d60f80b89e63dc875ee4bdff0acfdd4ccee0bbb6bc22b6a5fa537fa32fe4ccdcef8b45aaada372

memory/1852-28-0x0000000000400000-0x00000000007C8000-memory.dmp

memory/3672-30-0x0000000000400000-0x00000000007C8000-memory.dmp

memory/4556-36-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-33-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-37-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/1852-39-0x0000000000400000-0x00000000007C8000-memory.dmp

memory/4556-40-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-41-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-44-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-43-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-42-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-45-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-46-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-47-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-48-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-49-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-50-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-51-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-52-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-53-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-54-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-55-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-56-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-57-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-58-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-59-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4556-60-0x0000000000400000-0x00000000004B5000-memory.dmp