Malware Analysis Report

2024-08-06 19:01

Sample ID 240617-lrxbxsyhjr
Target b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118
SHA256 6791affc48329b51d0ea44f932f4e7c4de0ddcf3e4be972f6f69faa0419c57dc
Tags
darkcomet donm persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6791affc48329b51d0ea44f932f4e7c4de0ddcf3e4be972f6f69faa0419c57dc

Threat Level: Known bad

The file b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

darkcomet donm persistence rat trojan

Modifies WinLogon for persistence

Darkcomet

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Adds Run key to start application

Drops desktop.ini file(s)

Drops file in Windows directory

Unsigned PE

Enumerates physical storage devices

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: RenamesItself

Suspicious use of WriteProcessMemory

NTFS ADS

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-17 09:46

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-17 09:46

Reported

2024-06-17 09:49

Platform

win7-20231129-en

Max time kernel

150s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\QRAqgJowQC7T\\" C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\updates = "C:\\Users\\Admin\\AppData\\Local\\Temp\\QRAqgJowQC7T\\" C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A

Enumerates physical storage devices

NTFS ADS

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier C:\Windows\SysWOW64\cmd.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2004 wrote to memory of 1196 N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2004 wrote to memory of 1196 N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2004 wrote to memory of 1196 N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2004 wrote to memory of 1196 N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1196 wrote to memory of 2704 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1196 wrote to memory of 2704 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1196 wrote to memory of 2704 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1196 wrote to memory of 2704 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2004 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tmp.exe
PID 2004 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tmp.exe
PID 2004 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tmp.exe
PID 2004 wrote to memory of 2252 N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tmp.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2252 wrote to memory of 2640 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe

Processes

C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

"cmd.exe"

C:\Windows\SysWOW64\reg.exe

reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f

C:\Users\Admin\AppData\Local\Temp\tmp.exe

"C:\Users\Admin\AppData\Local\Temp\tmp.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

Network

Country Destination Domain Proto
NL 185.142.239.190:5655 tcp
NL 185.142.239.190:5655 tcp
NL 185.142.239.190:5655 tcp
NL 185.142.239.190:5655 tcp
NL 185.142.239.190:5655 tcp
NL 185.142.239.190:5655 tcp
NL 185.142.239.190:5655 tcp

Files

memory/2004-0-0x0000000074D31000-0x0000000074D32000-memory.dmp

memory/2004-1-0x0000000074D30000-0x00000000752DB000-memory.dmp

memory/2004-2-0x0000000074D30000-0x00000000752DB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.jpg

MD5 b7f83d777901bf5ef4ef43390451cc96
SHA1 0281c8ac014d19145b21730c8972d73fef62b7b1
SHA256 6791affc48329b51d0ea44f932f4e7c4de0ddcf3e4be972f6f69faa0419c57dc
SHA512 4ad7e180c4d32ffc20e2d98be41c9aefcffa5cd13b573f1cd2f93bb353f86045c2e177a322a14d3299055214800304bcaded589843155fb2cabf3be18b240b0f

\Users\Admin\AppData\Local\Temp\tmp.exe

MD5 405cce49ffe4ce262b709887e4c285a5
SHA1 5d9a97e8b94e27e2586144a7d69a87f5cc8321b4
SHA256 ae429d9947d29afaae8c8256ad8ddd6339337102881876f38572dff3f132cbd5
SHA512 ee7c62b89f5ec8bb7d3da5876b8849f87b1342b354d55419cf9cdc073ec54744ce25a880dcddc27e13eb11b02b2be89155f22317774fcb56900d24d757783dd7

memory/2252-17-0x00000000003E0000-0x00000000003E1000-memory.dmp

memory/2640-44-0x00000000001C0000-0x00000000001C1000-memory.dmp

memory/2640-19-0x00000000000C0000-0x00000000000C1000-memory.dmp

memory/2004-45-0x0000000074D30000-0x00000000752DB000-memory.dmp

memory/2004-46-0x0000000074D30000-0x00000000752DB000-memory.dmp

memory/2252-47-0x0000000000400000-0x00000000004DD000-memory.dmp

memory/2252-49-0x0000000000400000-0x00000000004DD000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-17 09:46

Reported

2024-06-17 09:49

Platform

win10v2004-20240611-en

Max time kernel

150s

Max time network

96s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\QRAqgJowQC7T\\" C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\updates = "C:\\Users\\Admin\\AppData\\Local\\Temp\\QRAqgJowQC7T\\" C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe N/A
File created C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\assembly C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe N/A
File created C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe N/A
File opened for modification C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe N/A

Enumerates physical storage devices

NTFS ADS

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier C:\Windows\SysWOW64\cmd.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1688 wrote to memory of 1892 N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1688 wrote to memory of 1892 N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1688 wrote to memory of 1892 N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 1892 wrote to memory of 1212 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1892 wrote to memory of 1212 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1892 wrote to memory of 1212 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1688 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tmp.exe
PID 1688 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tmp.exe
PID 1688 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\tmp.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe
PID 2040 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\tmp.exe C:\Windows\SysWOW64\notepad.exe

Processes

C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\b7f83d777901bf5ef4ef43390451cc96_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

"cmd.exe"

C:\Windows\SysWOW64\reg.exe

reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f

C:\Users\Admin\AppData\Local\Temp\tmp.exe

"C:\Users\Admin\AppData\Local\Temp\tmp.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

Network

Country Destination Domain Proto
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 80.14.97.104.in-addr.arpa udp
NL 185.142.239.190:5655 tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 32.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 241.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp

Files

memory/1688-0-0x00000000750E2000-0x00000000750E3000-memory.dmp

memory/1688-1-0x00000000750E0000-0x0000000075691000-memory.dmp

memory/1688-2-0x00000000750E0000-0x0000000075691000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.jpg

MD5 b7f83d777901bf5ef4ef43390451cc96
SHA1 0281c8ac014d19145b21730c8972d73fef62b7b1
SHA256 6791affc48329b51d0ea44f932f4e7c4de0ddcf3e4be972f6f69faa0419c57dc
SHA512 4ad7e180c4d32ffc20e2d98be41c9aefcffa5cd13b573f1cd2f93bb353f86045c2e177a322a14d3299055214800304bcaded589843155fb2cabf3be18b240b0f

C:\Users\Admin\AppData\Local\Temp\tmp.exe

MD5 405cce49ffe4ce262b709887e4c285a5
SHA1 5d9a97e8b94e27e2586144a7d69a87f5cc8321b4
SHA256 ae429d9947d29afaae8c8256ad8ddd6339337102881876f38572dff3f132cbd5
SHA512 ee7c62b89f5ec8bb7d3da5876b8849f87b1342b354d55419cf9cdc073ec54744ce25a880dcddc27e13eb11b02b2be89155f22317774fcb56900d24d757783dd7

memory/2040-21-0x0000000002520000-0x0000000002521000-memory.dmp

memory/2260-22-0x0000000000A90000-0x0000000000A91000-memory.dmp

memory/1688-23-0x00000000750E2000-0x00000000750E3000-memory.dmp

memory/1688-24-0x00000000750E0000-0x0000000075691000-memory.dmp

memory/1688-26-0x00000000750E0000-0x0000000075691000-memory.dmp

memory/2040-27-0x0000000000400000-0x00000000004DD000-memory.dmp

memory/2040-29-0x0000000000400000-0x00000000004DD000-memory.dmp