Malware Analysis Report

2024-08-06 19:25

Sample ID 240519-mteqbsef6v
Target VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b
SHA256 5131d0642a54d02c54545e823e706b89be27243608a047c07349fbc30e07dde5
Tags
darkcomet evasion persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

5131d0642a54d02c54545e823e706b89be27243608a047c07349fbc30e07dde5

Threat Level: Known bad

The file VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b was found to be: Known bad.

Malicious Activity Summary

darkcomet evasion persistence rat trojan

Modifies WinLogon for persistence

Darkcomet

Sets file to hidden

Checks computer location settings

Loads dropped DLL

Executes dropped EXE

Adds Run key to start application

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Views/modifies file attributes

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-19 10:45

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-19 10:45

Reported

2024-05-19 10:45

Platform

win10v2004-20240508-en

Max time kernel

17s

Max time network

18s

Command Line

"C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\permdata\\java.exe" C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\permdata\java.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Essentials = "C:\\Users\\Admin\\AppData\\Roaming\\MsMpEng.exe" C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\java = "C:\\permdata\\java.exe" C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4984 set thread context of 4552 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4984 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 4984 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 4984 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 4984 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 4984 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 4984 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 4984 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 4984 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 4984 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 4984 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 4984 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 4984 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 4984 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 4984 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 4552 wrote to memory of 4620 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 4552 wrote to memory of 4620 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 4552 wrote to memory of 4620 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 4552 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\permdata\java.exe
PID 4552 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\permdata\java.exe
PID 4552 wrote to memory of 4604 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\permdata\java.exe
PID 4620 wrote to memory of 3600 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 4620 wrote to memory of 3600 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 4620 wrote to memory of 3600 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe

"C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe"

C:\Users\Admin\AppData\Local\Temp\svchost.exe

C:\Users\Admin\AppData\Local\Temp\svchost.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "

C:\permdata\java.exe

"C:\permdata\java.exe"

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

Network

Country Destination Domain Proto
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp

Files

memory/4984-0-0x0000000074A62000-0x0000000074A63000-memory.dmp

memory/4984-1-0x0000000074A60000-0x0000000075011000-memory.dmp

memory/4984-3-0x0000000074A60000-0x0000000075011000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\svchost.exe

MD5 e118330b4629b12368d91b9df6488be0
SHA1 ce90218c7e3b90df2a3409ec253048bb6472c2fd
SHA256 3a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9
SHA512 ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0

memory/4552-6-0x0000000000400000-0x00000000004CB000-memory.dmp

memory/4552-9-0x0000000000400000-0x00000000004CB000-memory.dmp

memory/4552-13-0x0000000000400000-0x00000000004CB000-memory.dmp

memory/4552-11-0x0000000000400000-0x00000000004CB000-memory.dmp

memory/4552-18-0x00000000025D0000-0x00000000025D1000-memory.dmp

memory/4552-29-0x0000000000400000-0x00000000004CB000-memory.dmp

memory/4984-31-0x0000000074A60000-0x0000000075011000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat

MD5 b774ae3fb1da087e1f83b4f7b2060e5a
SHA1 97eb9be49ac3af9c851c9e1e84e32bfd53e325a8
SHA256 adaf4a84b41e410b02e261cfd0fe7739d98647eab73c3badd32ac6e39f26351b
SHA512 f75d0f95f7306d26a12b414bfe37b97fbd37546cb3c6e403def7077329ddffb4b45d5c5f0ba0e7bb6d72851d2d691b0a85267beead42f7cbf2e8c3d45a3b4701

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-19 10:45

Reported

2024-05-19 10:45

Platform

win7-20240221-en

Max time kernel

1s

Max time network

1s

Command Line

"C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\permdata\\java.exe" C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
N/A N/A C:\permdata\java.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Essentials = "C:\\Users\\Admin\\AppData\\Roaming\\MsMpEng.exe" C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\java = "C:\\permdata\\java.exe" C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2796 set thread context of 1944 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2796 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2796 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2796 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2796 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2796 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2796 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2796 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2796 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2796 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2796 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2796 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2796 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2796 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 1944 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 1944 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 1944 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 1944 wrote to memory of 2608 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 1944 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\permdata\java.exe
PID 1944 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\permdata\java.exe
PID 1944 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\permdata\java.exe
PID 1944 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\permdata\java.exe
PID 2608 wrote to memory of 2504 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2608 wrote to memory of 2504 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2608 wrote to memory of 2504 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2608 wrote to memory of 2504 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe

"C:\Users\Admin\AppData\Local\Temp\VirusShare_f0a5b6bb52a088b9b8ee76b341e58e2b.exe"

C:\Users\Admin\AppData\Local\Temp\svchost.exe

C:\Users\Admin\AppData\Local\Temp\svchost.exe

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "

C:\permdata\java.exe

"C:\permdata\java.exe"

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

Network

N/A

Files

memory/2796-0-0x00000000744A1000-0x00000000744A2000-memory.dmp

memory/2796-2-0x00000000744A0000-0x0000000074A4B000-memory.dmp

memory/2796-3-0x00000000744A0000-0x0000000074A4B000-memory.dmp

\Users\Admin\AppData\Local\Temp\svchost.exe

MD5 ed797d8dc2c92401985d162e42ffa450
SHA1 0f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256 b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512 e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2

memory/1944-8-0x0000000000400000-0x00000000004CB000-memory.dmp

memory/1944-25-0x0000000000400000-0x00000000004CB000-memory.dmp

memory/1944-23-0x0000000000400000-0x00000000004CB000-memory.dmp

memory/1944-21-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/1944-20-0x0000000000400000-0x00000000004CB000-memory.dmp

memory/1944-18-0x0000000000400000-0x00000000004CB000-memory.dmp

memory/1944-16-0x0000000000400000-0x00000000004CB000-memory.dmp

memory/1944-14-0x0000000000400000-0x00000000004CB000-memory.dmp

memory/1944-13-0x0000000000400000-0x00000000004CB000-memory.dmp

memory/1944-12-0x0000000000400000-0x00000000004CB000-memory.dmp

memory/1944-10-0x0000000000400000-0x00000000004CB000-memory.dmp

memory/1944-26-0x0000000000400000-0x00000000004CB000-memory.dmp

memory/2796-31-0x00000000744A0000-0x0000000074A4B000-memory.dmp

memory/1944-32-0x0000000000400000-0x00000000004CB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat

MD5 b774ae3fb1da087e1f83b4f7b2060e5a
SHA1 97eb9be49ac3af9c851c9e1e84e32bfd53e325a8
SHA256 adaf4a84b41e410b02e261cfd0fe7739d98647eab73c3badd32ac6e39f26351b
SHA512 f75d0f95f7306d26a12b414bfe37b97fbd37546cb3c6e403def7077329ddffb4b45d5c5f0ba0e7bb6d72851d2d691b0a85267beead42f7cbf2e8c3d45a3b4701

memory/1944-52-0x0000000000400000-0x00000000004CB000-memory.dmp