Malware Analysis Report

2024-08-06 17:09

Sample ID 240519-zm36kahd4v
Target 5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118
SHA256 86d57c0daef1c23954e3ea2323935c745ccc9962b2e3988e02e52225549f13ab
Tags
guest16 darkcomet persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

86d57c0daef1c23954e3ea2323935c745ccc9962b2e3988e02e52225549f13ab

Threat Level: Known bad

The file 5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

guest16 darkcomet persistence rat trojan

Darkcomet

Darkcomet family

Modifies WinLogon for persistence

Deletes itself

Checks computer location settings

Loads dropped DLL

Executes dropped EXE

Adds Run key to start application

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Runs ping.exe

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-19 20:50

Signatures

Darkcomet family

darkcomet

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-19 20:50

Reported

2024-05-19 20:53

Platform

win7-20240221-en

Max time kernel

150s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A

Enumerates physical storage devices

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\PING.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: 33 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: 34 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: 35 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2208 wrote to memory of 2288 N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2208 wrote to memory of 2288 N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2208 wrote to memory of 2288 N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2208 wrote to memory of 2288 N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2208 wrote to memory of 3028 N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
PID 2208 wrote to memory of 3028 N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
PID 2208 wrote to memory of 3028 N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
PID 2208 wrote to memory of 3028 N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
PID 2288 wrote to memory of 2880 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2288 wrote to memory of 2880 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2288 wrote to memory of 2880 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2288 wrote to memory of 2880 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe"

C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe

"C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe"

C:\Windows\SysWOW64\PING.EXE

ping 127.0.0.1 -n 4

Network

Country Destination Domain Proto
US 8.8.8.8:53 minou470.no-ip.biz udp

Files

memory/2208-0-0x0000000000260000-0x0000000000261000-memory.dmp

\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe

MD5 5b67e0d6be1db935e2779f0e6746ddf2
SHA1 38b9a136e53d24404c96d3124cf85d48c1f313ab
SHA256 86d57c0daef1c23954e3ea2323935c745ccc9962b2e3988e02e52225549f13ab
SHA512 faa1a25ac236b077c5fdb7ba0bf5e8f4314e7b4a8d078763de901ced08838e359e4cf896170b72278a00da4c18cfa9bd5052bece86bcf8da61ef8dfb393bd08f

memory/2208-11-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3028-12-0x0000000000270000-0x0000000000271000-memory.dmp

memory/3028-13-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3028-14-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3028-15-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3028-16-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3028-17-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3028-18-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3028-19-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3028-20-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3028-21-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3028-22-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3028-23-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3028-24-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3028-25-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3028-26-0x0000000000400000-0x00000000004C8000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-19 20:50

Reported

2024-05-19 20:53

Platform

win10v2004-20240508-en

Max time kernel

150s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Enumerates physical storage devices

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\PING.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: 33 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: 34 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: 35 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: 36 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Users\Admin\AppData\Local\Temp\5b67e0d6be1db935e2779f0e6746ddf2_JaffaCakes118.exe"

C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe

"C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe"

C:\Windows\SysWOW64\PING.EXE

ping 127.0.0.1 -n 4

Network

Country Destination Domain Proto
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 203.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 52.111.229.43:443 tcp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 minou470.no-ip.biz udp
US 8.8.8.8:53 94.65.42.20.in-addr.arpa udp

Files

memory/4272-0-0x00000000007E0000-0x00000000007E1000-memory.dmp

C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe

MD5 5b67e0d6be1db935e2779f0e6746ddf2
SHA1 38b9a136e53d24404c96d3124cf85d48c1f313ab
SHA256 86d57c0daef1c23954e3ea2323935c745ccc9962b2e3988e02e52225549f13ab
SHA512 faa1a25ac236b077c5fdb7ba0bf5e8f4314e7b4a8d078763de901ced08838e359e4cf896170b72278a00da4c18cfa9bd5052bece86bcf8da61ef8dfb393bd08f

memory/4272-13-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3960-14-0x00000000006E0000-0x00000000006E1000-memory.dmp

memory/3960-15-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3960-16-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3960-17-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3960-18-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3960-19-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3960-20-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3960-21-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3960-22-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3960-23-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3960-24-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3960-25-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3960-26-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3960-27-0x0000000000400000-0x00000000004C8000-memory.dmp

memory/3960-28-0x0000000000400000-0x00000000004C8000-memory.dmp