Malware Analysis Report

2024-08-06 19:02

Sample ID 240620-a4ag5szarf
Target 0181449dcfd39a69330cbd3290f969a0_JaffaCakes118
SHA256 2adaac19bb91b55535a7bbfab0746e3b30cebd968d93f9c7a1f66b4ce9ded2b9
Tags
upx victim darkcomet persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2adaac19bb91b55535a7bbfab0746e3b30cebd968d93f9c7a1f66b4ce9ded2b9

Threat Level: Known bad

The file 0181449dcfd39a69330cbd3290f969a0_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

upx victim darkcomet persistence rat trojan

Darkcomet family

Modifies WinLogon for persistence

Darkcomet

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

UPX packed file

Adds Run key to start application

Enumerates physical storage devices

Unsigned PE

Suspicious use of SetWindowsHookEx

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Modifies registry class

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-20 00:45

Signatures

Darkcomet family

darkcomet

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-20 00:45

Reported

2024-06-20 00:48

Platform

win7-20240508-en

Max time kernel

148s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\win_updates.exe" C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Updates = "C:\\Users\\Admin\\Documents\\MSDCSC\\win_updates.exe" C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Updates = "C:\\Users\\Admin\\Documents\\MSDCSC\\win_updates.exe" C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: 33 N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: 34 N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: 35 N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe"

C:\Users\Admin\Documents\MSDCSC\win_updates.exe

"C:\Users\Admin\Documents\MSDCSC\win_updates.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp

Files

memory/2284-0-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2284-1-0x0000000000270000-0x0000000000271000-memory.dmp

C:\Users\Admin\Documents\MSDCSC\win_updates.exe

MD5 0181449dcfd39a69330cbd3290f969a0
SHA1 08354c1fd9a73dcdd4d487e8981b53628114fbfd
SHA256 2adaac19bb91b55535a7bbfab0746e3b30cebd968d93f9c7a1f66b4ce9ded2b9
SHA512 b94a3551a053e721167c16d65d47f3ba820d70431f27ec54953b33c44e5d845ec9ee59fee714aa50329bf8f4c120d5d46a428f3f1ac7952381a436a9965eed14

memory/2996-13-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2284-12-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2996-18-0x0000000000230000-0x00000000002FA000-memory.dmp

memory/2996-16-0x0000000000230000-0x00000000002FA000-memory.dmp

memory/2996-19-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2996-20-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2996-22-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2996-23-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2996-24-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2996-26-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2996-27-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2996-28-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2996-29-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2996-31-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2996-32-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2996-33-0x0000000000400000-0x00000000004CA000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-20 00:45

Reported

2024-06-20 00:48

Platform

win10v2004-20240508-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\win_updates.exe" C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Updates = "C:\\Users\\Admin\\Documents\\MSDCSC\\win_updates.exe" C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Updates = "C:\\Users\\Admin\\Documents\\MSDCSC\\win_updates.exe" C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: 33 N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: 34 N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: 35 N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A
Token: 36 N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\win_updates.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\0181449dcfd39a69330cbd3290f969a0_JaffaCakes118.exe"

C:\Users\Admin\Documents\MSDCSC\win_updates.exe

"C:\Users\Admin\Documents\MSDCSC\win_updates.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp
US 8.8.8.8:53 extr3me.no-ip.biz udp

Files

memory/1840-0-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/1840-1-0x00000000006E0000-0x00000000006E1000-memory.dmp

C:\Users\Admin\Documents\MSDCSC\win_updates.exe

MD5 0181449dcfd39a69330cbd3290f969a0
SHA1 08354c1fd9a73dcdd4d487e8981b53628114fbfd
SHA256 2adaac19bb91b55535a7bbfab0746e3b30cebd968d93f9c7a1f66b4ce9ded2b9
SHA512 b94a3551a053e721167c16d65d47f3ba820d70431f27ec54953b33c44e5d845ec9ee59fee714aa50329bf8f4c120d5d46a428f3f1ac7952381a436a9965eed14

memory/1840-64-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2332-65-0x0000000000680000-0x0000000000681000-memory.dmp

memory/2332-66-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2332-67-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2332-68-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2332-69-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2332-70-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2332-71-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2332-72-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2332-73-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2332-74-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2332-75-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2332-76-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2332-77-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2332-78-0x0000000000400000-0x00000000004CA000-memory.dmp

memory/2332-79-0x0000000000400000-0x00000000004CA000-memory.dmp