Malware Analysis Report

2024-08-06 14:49

Sample ID 240618-t4njjs1fpg
Target bceb426ca536e83d333d9be4592ca40f_JaffaCakes118
SHA256 3ca8fab40fbbaf3d389adce9db716872bd31e98e712488d5487d10612ef91ad6
Tags
nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3ca8fab40fbbaf3d389adce9db716872bd31e98e712488d5487d10612ef91ad6

Threat Level: Known bad

The file bceb426ca536e83d333d9be4592ca40f_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger persistence spyware stealer trojan

NanoCore

Checks computer location settings

Deletes itself

Checks whether UAC is enabled

Adds Run key to start application

Suspicious use of SetThreadContext

Drops file in Program Files directory

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: MapViewOfSection

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of WriteProcessMemory

Scheduled Task/Job: Scheduled Task

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-18 16:36

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-18 16:36

Reported

2024-06-18 16:39

Platform

win7-20240220-en

Max time kernel

146s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TCP Subsystem = "C:\\Program Files (x86)\\TCP Subsystem\\tcpss.exe" C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1984 set thread context of 2688 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\TCP Subsystem\tcpss.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
File opened for modification C:\Program Files (x86)\TCP Subsystem\tcpss.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Enumerates physical storage devices

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1984 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 1984 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 1984 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 1984 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 1984 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 1984 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 1984 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 1984 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 1984 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\SysWOW64\cmd.exe
PID 1984 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\SysWOW64\cmd.exe
PID 1984 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\SysWOW64\cmd.exe
PID 1984 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\SysWOW64\cmd.exe
PID 2516 wrote to memory of 2600 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 2516 wrote to memory of 2600 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 2516 wrote to memory of 2600 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 2516 wrote to memory of 2600 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 2688 wrote to memory of 2544 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2688 wrote to memory of 2544 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2688 wrote to memory of 2544 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2688 wrote to memory of 2544 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2688 wrote to memory of 2504 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2688 wrote to memory of 2504 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2688 wrote to memory of 2504 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2688 wrote to memory of 2504 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe

"C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe"

C:\Windows\SysWOW64\choice.exe

choice /C Y /N /D Y /T 3

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "TCP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmp2BD1.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "TCP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp2C5F.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
DE 79.134.225.105:3575 tcp
DE 79.134.225.105:3575 tcp
DE 79.134.225.105:3575 tcp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
DE 79.134.225.105:3575 tcp
DE 79.134.225.105:3575 tcp
DE 79.134.225.105:3575 tcp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
DE 79.134.225.105:3575 tcp
DE 79.134.225.105:3575 tcp
DE 79.134.225.105:3575 tcp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
DE 79.134.225.105:3575 tcp
DE 79.134.225.105:3575 tcp
DE 79.134.225.105:3575 tcp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
DE 79.134.225.105:3575 tcp
DE 79.134.225.105:3575 tcp
DE 79.134.225.105:3575 tcp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp

Files

memory/1984-2-0x0000000000460000-0x00000000004A2000-memory.dmp

memory/1984-1-0x0000000000C40000-0x0000000000C98000-memory.dmp

memory/1984-0-0x000000007450E000-0x000000007450F000-memory.dmp

memory/2688-7-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2688-5-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2688-3-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1984-8-0x0000000074500000-0x0000000074BEE000-memory.dmp

memory/1984-9-0x0000000074500000-0x0000000074BEE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp2BD1.tmp

MD5 48ef7fa9033389ad7929d7a6b9d10298
SHA1 9db6cb7325c8bdf66a15f7b5f34703709a45aeb6
SHA256 0c1b5f67eeb276d1d4205b138ce32bc6149924e02281a2db8e4623a700e88f15
SHA512 ac8bd104ecbacc9bccce9e087f67e5b18072d59367ccd31d4e66132b6baaea520cba5b9b59464483d86abf74826b382c402f12e9a586c99bda8c78a0de33944e

C:\Users\Admin\AppData\Local\Temp\tmp2C5F.tmp

MD5 4b7ef560289c0f62d0baf6f14f48a57a
SHA1 8331acb90dde588aa3196919f6e847f398fd06d1
SHA256 062844155306130d6fafc4fe10ac9e5ddd2ed462532b729c50cdc979c0d83207
SHA512 ecaa27c4b703d95f9f9b37d8c339982970482e7dab968c2010e0aa644bbfa31973111aafb827565af30c423d1d14e4ff997ec149614e713ff7ef3456894d02d8

memory/2688-17-0x0000000000540000-0x000000000054A000-memory.dmp

memory/2688-18-0x00000000005E0000-0x00000000005FE000-memory.dmp

memory/2688-19-0x0000000000550000-0x000000000055A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-18 16:36

Reported

2024-06-18 16:39

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Host = "C:\\Program Files (x86)\\DDP Host\\ddphost.exe" C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4984 set thread context of 2372 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\DDP Host\ddphost.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A
File opened for modification C:\Program Files (x86)\DDP Host\ddphost.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Enumerates physical storage devices

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4984 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 4984 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 4984 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 4984 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
PID 4984 wrote to memory of 5048 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\SysWOW64\cmd.exe
PID 4984 wrote to memory of 5048 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\SysWOW64\cmd.exe
PID 4984 wrote to memory of 5048 N/A C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe C:\Windows\SysWOW64\cmd.exe
PID 5048 wrote to memory of 3864 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 5048 wrote to memory of 3864 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 5048 wrote to memory of 3864 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\choice.exe
PID 2372 wrote to memory of 512 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2372 wrote to memory of 512 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2372 wrote to memory of 512 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2372 wrote to memory of 4404 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2372 wrote to memory of 4404 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe
PID 2372 wrote to memory of 4404 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe

"C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\final bill copy 28.6.2020.exe"

C:\Windows\SysWOW64\choice.exe

choice /C Y /N /D Y /T 3

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DDP Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmp5880.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DDP Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp599A.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.8.8:53 4.4.8.8.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
DE 79.134.225.105:3575 tcp
DE 79.134.225.105:3575 tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
DE 79.134.225.105:3575 tcp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 31.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
DE 79.134.225.105:3575 tcp
DE 79.134.225.105:3575 tcp
US 8.8.8.8:53 99.58.20.217.in-addr.arpa udp
DE 79.134.225.105:3575 tcp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
DE 79.134.225.105:3575 tcp
DE 79.134.225.105:3575 tcp
US 8.8.8.8:53 105.83.221.88.in-addr.arpa udp
DE 79.134.225.105:3575 tcp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
DE 79.134.225.105:3575 tcp
DE 79.134.225.105:3575 tcp
DE 79.134.225.105:3575 tcp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
US 8.8.4.4:53 officezafar.hopto.org udp
US 8.8.8.8:53 officezafar.hopto.org udp
DE 79.134.225.105:3575 tcp
US 8.8.8.8:53 2.173.189.20.in-addr.arpa udp

Files

memory/4984-0-0x0000000074F1E000-0x0000000074F1F000-memory.dmp

memory/4984-1-0x0000000000D90000-0x0000000000DE8000-memory.dmp

memory/4984-2-0x00000000056E0000-0x0000000005722000-memory.dmp

memory/2372-3-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2372-5-0x0000000005720000-0x0000000005CC4000-memory.dmp

memory/2372-6-0x0000000074F10000-0x00000000756C0000-memory.dmp

memory/2372-7-0x0000000005210000-0x00000000052A2000-memory.dmp

memory/4984-4-0x0000000074F10000-0x00000000756C0000-memory.dmp

memory/2372-8-0x0000000005350000-0x00000000053EC000-memory.dmp

memory/2372-9-0x00000000052C0000-0x00000000052CA000-memory.dmp

memory/4984-14-0x0000000074F10000-0x00000000756C0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp5880.tmp

MD5 48ef7fa9033389ad7929d7a6b9d10298
SHA1 9db6cb7325c8bdf66a15f7b5f34703709a45aeb6
SHA256 0c1b5f67eeb276d1d4205b138ce32bc6149924e02281a2db8e4623a700e88f15
SHA512 ac8bd104ecbacc9bccce9e087f67e5b18072d59367ccd31d4e66132b6baaea520cba5b9b59464483d86abf74826b382c402f12e9a586c99bda8c78a0de33944e

C:\Users\Admin\AppData\Local\Temp\tmp599A.tmp

MD5 2271642ca970891700e3f48439739ed8
SHA1 cd472df2349f7db9e1e460d0ee28acd97b8a8793
SHA256 7aba66abbcb0b13455609174db23aed495a9adbef0e0acd28baa9c92445eda68
SHA512 4669a4ef8ec28cdb852ffc1401576b1bf9a9d837797d7d92bc88c18b3097404f36854e50167b309706fef400cabc43c876569ce2797ba85eb169a2783b8fe807

memory/2372-19-0x0000000005310000-0x000000000531A000-memory.dmp

memory/2372-20-0x0000000005490000-0x00000000054AE000-memory.dmp

memory/2372-21-0x0000000005700000-0x000000000570A000-memory.dmp

memory/2372-22-0x0000000074F10000-0x00000000756C0000-memory.dmp