Malware Analysis Report

2024-08-06 19:32

Sample ID 240521-sysqmsaf2y
Target 63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118
SHA256 9740492962928aafcfc3823083ab7e1b092afdbccc830c607f01019537b80407
Tags
upx fack you darkcomet persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

9740492962928aafcfc3823083ab7e1b092afdbccc830c607f01019537b80407

Threat Level: Known bad

The file 63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

upx fack you darkcomet persistence rat trojan

Darkcomet

Modifies WinLogon for persistence

Darkcomet family

Loads dropped DLL

Executes dropped EXE

UPX packed file

Checks computer location settings

Adds Run key to start application

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Modifies registry class

Suspicious use of SetWindowsHookEx

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-21 15:32

Signatures

Darkcomet family

darkcomet

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-21 15:32

Reported

2024-05-21 15:34

Platform

win7-20240220-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 33 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 34 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 35 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\DllHost.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2820 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2820 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2820 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2820 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2636 wrote to memory of 2596 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe

Processes

C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe"

C:\Windows\SysWOW64\DllHost.exe

C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}

C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

Network

Country Destination Domain Proto
US 8.8.8.8:53 mfashi.ddns.net udp
N/A 192.168.0.102:1995 tcp
N/A 192.168.0.102:1995 tcp
N/A 192.168.0.102:1995 tcp
N/A 192.168.0.102:1995 tcp
N/A 192.168.0.102:1995 tcp
N/A 192.168.0.102:1995 tcp
N/A 192.168.0.102:1995 tcp

Files

memory/2820-60-0x0000000000400000-0x00000000004DC000-memory.dmp

memory/2596-59-0x0000000000260000-0x0000000000261000-memory.dmp

memory/2596-21-0x0000000000080000-0x0000000000081000-memory.dmp

C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

MD5 63cbce809a2813c3a62433cd1a71ece6
SHA1 611253d54dd926899e9e6d7607ef137a3a1562c1
SHA256 9740492962928aafcfc3823083ab7e1b092afdbccc830c607f01019537b80407
SHA512 6febbe6f6feb7b4159e97bbd8398fe08144463f99a16e7d0f10e05e62d2d0b516d12775fb0999dfd1716260b0e06dcfe242fdd2ed44201c89e285b16b4c04370

memory/2820-19-0x0000000004190000-0x000000000426C000-memory.dmp

memory/2636-18-0x0000000000400000-0x00000000004DC000-memory.dmp

memory/2820-17-0x0000000004190000-0x000000000426C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\LTHO0NZGK1Y.JPG

MD5 9e0897de252ddb54f53daae74feccc38
SHA1 fbc9d72751edd523ed13121941df428c350532c0
SHA256 bc1972daaded3ee83c0279d1f31e7f47cd1fd6281be724d45f31004827fe4ed1
SHA512 c3baabdffb82bba424226f14317bb17bfe08c9fa30bae4d8a8919cf646f24f1793d40b3029e3e152a6aa9ec7fbe9169d74e01f83aa0c8202a970e0d664e6a29a

memory/2920-7-0x0000000000800000-0x0000000000801000-memory.dmp

memory/2920-6-0x00000000003E0000-0x00000000003E2000-memory.dmp

memory/2820-5-0x0000000002300000-0x0000000002302000-memory.dmp

memory/2820-1-0x0000000000260000-0x0000000000261000-memory.dmp

memory/2820-0-0x0000000000400000-0x00000000004DC000-memory.dmp

memory/2636-61-0x0000000000400000-0x00000000004DC000-memory.dmp

memory/2920-62-0x0000000000800000-0x0000000000801000-memory.dmp

memory/2636-64-0x0000000000400000-0x00000000004DC000-memory.dmp

memory/2636-66-0x0000000000400000-0x00000000004DC000-memory.dmp

memory/2636-69-0x0000000000400000-0x00000000004DC000-memory.dmp

memory/2636-71-0x0000000000400000-0x00000000004DC000-memory.dmp

memory/2636-73-0x0000000000400000-0x00000000004DC000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-21 15:32

Reported

2024-05-21 15:34

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 33 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 34 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 35 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 36 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 756 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 756 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 756 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2412 wrote to memory of 2076 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe

Processes

C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\63cbce809a2813c3a62433cd1a71ece6_JaffaCakes118.exe"

C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

Network

Country Destination Domain Proto
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 mfashi.ddns.net udp
N/A 192.168.0.102:1995 tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 mfashi.ddns.net udp
N/A 192.168.0.102:1995 tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 mfashi.ddns.net udp
N/A 192.168.0.102:1995 tcp
US 8.8.8.8:53 91.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 mfashi.ddns.net udp
N/A 192.168.0.102:1995 tcp
US 8.8.8.8:53 mfashi.ddns.net udp
N/A 192.168.0.102:1995 tcp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 mfashi.ddns.net udp
N/A 192.168.0.102:1995 tcp
US 8.8.8.8:53 mfashi.ddns.net udp
N/A 192.168.0.102:1995 tcp
US 8.8.8.8:53 7.173.189.20.in-addr.arpa udp

Files

memory/756-0-0x0000000000400000-0x00000000004DC000-memory.dmp

memory/756-1-0x0000000000B00000-0x0000000000B01000-memory.dmp

C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

MD5 63cbce809a2813c3a62433cd1a71ece6
SHA1 611253d54dd926899e9e6d7607ef137a3a1562c1
SHA256 9740492962928aafcfc3823083ab7e1b092afdbccc830c607f01019537b80407
SHA512 6febbe6f6feb7b4159e97bbd8398fe08144463f99a16e7d0f10e05e62d2d0b516d12775fb0999dfd1716260b0e06dcfe242fdd2ed44201c89e285b16b4c04370

memory/2412-63-0x0000000000400000-0x00000000004DC000-memory.dmp

memory/2412-64-0x00000000020A0000-0x00000000020A1000-memory.dmp

memory/2076-65-0x00000000007C0000-0x00000000007C1000-memory.dmp

memory/756-66-0x0000000000400000-0x00000000004DC000-memory.dmp

memory/2412-67-0x0000000000400000-0x00000000004DC000-memory.dmp

memory/2412-69-0x0000000000400000-0x00000000004DC000-memory.dmp

memory/2412-71-0x0000000000400000-0x00000000004DC000-memory.dmp

memory/2412-73-0x0000000000400000-0x00000000004DC000-memory.dmp

memory/2412-75-0x0000000000400000-0x00000000004DC000-memory.dmp

memory/2412-77-0x0000000000400000-0x00000000004DC000-memory.dmp

memory/2412-79-0x0000000000400000-0x00000000004DC000-memory.dmp