Analysis Overview
SHA256
5ab8d01b8144e70ab1e5720ec8e672695068439c8e65b7bd884944117aa00e40
Threat Level: Known bad
The file 03d6a067416e684cba893542c4ff1094_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Darkcomet
Modifies WinLogon for persistence
ModiLoader, DBatLoader
ModiLoader Second Stage
Loads dropped DLL
Checks computer location settings
Executes dropped EXE
Adds Run key to start application
Writes to the Master Boot Record (MBR)
Suspicious use of SetThreadContext
Enumerates physical storage devices
Unsigned PE
Suspicious use of SetWindowsHookEx
Runs ping.exe
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-20 06:59
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-20 06:59
Reported
2024-06-20 07:01
Platform
win7-20240508-en
Max time kernel
149s
Max time network
150s
Command Line
Signatures
Darkcomet
ModiLoader, DBatLoader
Modifies WinLogon for persistence
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
ModiLoader Second Stage
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\met start.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\met start.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\met start.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\met start.exe\"" | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\met start.exe\"" | C:\Users\Admin\AppData\Roaming\met start.exe | N/A |
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Roaming\met start.exe | N/A |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe | N/A |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
Suspicious use of SetThreadContext
Enumerates physical storage devices
Runs ping.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\PING.EXE | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\met start.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\met start.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe
"C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe"
C:\Users\Admin\AppData\Local\Temp\d48z.exe
"C:\Users\Admin\AppData\Local\Temp\d48z.exe"
C:\Users\Admin\AppData\Local\Temp\d48z.exe
"C:\Users\Admin\AppData\Local\Temp\d48z.exe"
C:\Users\Admin\AppData\Local\Temp\d48z.exe
"C:\Users\Admin\AppData\Local\Temp\d48z.exe"
C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe
"C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe"
C:\Users\Admin\AppData\Roaming\met start.exe
"C:\Users\Admin\AppData\Roaming\met start.exe"
C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe
"C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe"
C:\Users\Admin\AppData\Roaming\met start.exe
"C:\Users\Admin\AppData\Roaming\met start.exe"
C:\Users\Admin\AppData\Roaming\met start.exe
"C:\Users\Admin\AppData\Roaming\met start.exe"
C:\Users\Admin\AppData\Roaming\svchost.exe
"C:\Users\Admin\AppData\Roaming\svchost.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe"
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1 -n 5
C:\Users\Admin\AppData\Roaming\svchost.exe
"C:\Users\Admin\AppData\Roaming\svchost.exe"
C:\Users\Admin\AppData\Roaming\svchost.exe
"C:\Users\Admin\AppData\Roaming\svchost.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
Files
memory/2716-0-0x0000000000400000-0x0000000000544000-memory.dmp
memory/1704-3-0x0000000000400000-0x000000000051D000-memory.dmp
memory/1704-7-0x0000000000400000-0x000000000051D000-memory.dmp
memory/1704-13-0x0000000000400000-0x000000000051D000-memory.dmp
memory/1704-15-0x0000000000400000-0x000000000051D000-memory.dmp
memory/1704-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/1704-5-0x0000000000400000-0x000000000051D000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\d48z.exe
| MD5 | c7e2e7f78d3176794bfd37c571552c5d |
| SHA1 | 5ade0c1a932080dc28982e9ac751ef40a819bfab |
| SHA256 | b148721896f9a0fbb6113e5c381dd2555dbbb37d72c780a6ca09b2639e20e876 |
| SHA512 | f0b9e1d64c5484cd1073c8cdf65f3c8921fe1588137137de0a3d3bcdb2818441fd0e2ddb7d8b189ef879b3303804438e615ed79398e2c5a8aa254d6428b9848a |
memory/2736-36-0x0000000000400000-0x000000000043C000-memory.dmp
memory/1704-40-0x0000000000400000-0x000000000051D000-memory.dmp
memory/2128-37-0x0000000000400000-0x00000000004D5000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe
| MD5 | dc11a2ac0e7fda0d531fcd4350b6b56f |
| SHA1 | 32bf2255a2397c4bae5e9250260ce9b2c2a901c4 |
| SHA256 | fb708bf5cb6e60a45fbe23446b723b79ca3b1720f567afca5c5cd57c07ccb23c |
| SHA512 | a4a569fcdf977dd1e5b01416b69a04f53af190dd0d956f3ffca6101f8af62d8bc47052ede34f3ba395e683aeae3669e609a44812753e8d4818cf1eb1e0698e7f |
memory/2680-60-0x0000000000400000-0x0000000000415000-memory.dmp
memory/2680-56-0x0000000000400000-0x0000000000415000-memory.dmp
memory/2680-50-0x0000000000400000-0x0000000000415000-memory.dmp
memory/2680-48-0x0000000000400000-0x0000000000415000-memory.dmp
memory/2680-46-0x0000000000400000-0x0000000000415000-memory.dmp
memory/2524-83-0x0000000000400000-0x000000000040F000-memory.dmp
memory/2524-82-0x0000000000400000-0x000000000040F000-memory.dmp
memory/2680-91-0x0000000000400000-0x0000000000415000-memory.dmp
memory/2524-101-0x0000000000400000-0x000000000040F000-memory.dmp
memory/2952-113-0x0000000000400000-0x00000000004AE000-memory.dmp
memory/2952-108-0x0000000000400000-0x00000000004AE000-memory.dmp
memory/2952-106-0x0000000000400000-0x00000000004AE000-memory.dmp
memory/2952-105-0x0000000000400000-0x00000000004AE000-memory.dmp
memory/2524-88-0x0000000000400000-0x000000000040F000-memory.dmp
memory/2524-80-0x0000000000400000-0x000000000040F000-memory.dmp
memory/2524-76-0x0000000000400000-0x000000000040F000-memory.dmp
memory/2524-74-0x0000000000400000-0x000000000040F000-memory.dmp
memory/2524-72-0x0000000000400000-0x000000000040F000-memory.dmp
memory/2524-70-0x0000000000400000-0x000000000040F000-memory.dmp
memory/2524-68-0x0000000000400000-0x000000000040F000-memory.dmp
memory/2524-66-0x0000000000400000-0x000000000040F000-memory.dmp
memory/2524-64-0x0000000000400000-0x000000000040F000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-20 06:59
Reported
2024-06-20 07:01
Platform
win10v2004-20240508-en
Max time kernel
150s
Max time network
150s
Command Line
Signatures
Darkcomet
ModiLoader, DBatLoader
Modifies WinLogon for persistence
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
ModiLoader Second Stage
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\met start.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\met start.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\met start.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\met start.exe\"" | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\met start.exe\"" | C:\Users\Admin\AppData\Roaming\met start.exe | N/A |
Writes to the Master Boot Record (MBR)
| Description | Indicator | Process | Target |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Roaming\met start.exe | N/A |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe | N/A |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
| File opened for modification | \??\PhysicalDrive0 | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
Suspicious use of SetThreadContext
Enumerates physical storage devices
Runs ping.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\PING.EXE | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\d48z.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\met start.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\met start.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\svchost.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\03d6a067416e684cba893542c4ff1094_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe
"C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe"
C:\Users\Admin\AppData\Local\Temp\d48z.exe
"C:\Users\Admin\AppData\Local\Temp\d48z.exe"
C:\Users\Admin\AppData\Local\Temp\d48z.exe
"C:\Users\Admin\AppData\Local\Temp\d48z.exe"
C:\Users\Admin\AppData\Local\Temp\d48z.exe
"C:\Users\Admin\AppData\Local\Temp\d48z.exe"
C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe
"C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe"
C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe
"C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe"
C:\Users\Admin\AppData\Roaming\met start.exe
"C:\Users\Admin\AppData\Roaming\met start.exe"
C:\Users\Admin\AppData\Roaming\svchost.exe
"C:\Users\Admin\AppData\Roaming\svchost.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 5 > NUL&del "C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe"
C:\Users\Admin\AppData\Roaming\met start.exe
"C:\Users\Admin\AppData\Roaming\met start.exe"
C:\Users\Admin\AppData\Roaming\met start.exe
"C:\Users\Admin\AppData\Roaming\met start.exe"
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1 -n 5
C:\Users\Admin\AppData\Roaming\svchost.exe
"C:\Users\Admin\AppData\Roaming\svchost.exe"
C:\Users\Admin\AppData\Roaming\svchost.exe
"C:\Users\Admin\AppData\Roaming\svchost.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
| US | 8.8.8.8:53 | zerohaxor1.no-ip.org | udp |
Files
memory/2496-0-0x0000000000400000-0x0000000000544000-memory.dmp
memory/2860-3-0x0000000000400000-0x000000000051D000-memory.dmp
memory/2860-5-0x0000000000400000-0x000000000051D000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\darkcrypted.exe
| MD5 | dc11a2ac0e7fda0d531fcd4350b6b56f |
| SHA1 | 32bf2255a2397c4bae5e9250260ce9b2c2a901c4 |
| SHA256 | fb708bf5cb6e60a45fbe23446b723b79ca3b1720f567afca5c5cd57c07ccb23c |
| SHA512 | a4a569fcdf977dd1e5b01416b69a04f53af190dd0d956f3ffca6101f8af62d8bc47052ede34f3ba395e683aeae3669e609a44812753e8d4818cf1eb1e0698e7f |
memory/4820-20-0x0000000000400000-0x00000000004D5000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\d48z.exe
| MD5 | c7e2e7f78d3176794bfd37c571552c5d |
| SHA1 | 5ade0c1a932080dc28982e9ac751ef40a819bfab |
| SHA256 | b148721896f9a0fbb6113e5c381dd2555dbbb37d72c780a6ca09b2639e20e876 |
| SHA512 | f0b9e1d64c5484cd1073c8cdf65f3c8921fe1588137137de0a3d3bcdb2818441fd0e2ddb7d8b189ef879b3303804438e615ed79398e2c5a8aa254d6428b9848a |
memory/976-31-0x0000000000400000-0x000000000043C000-memory.dmp
memory/2860-38-0x0000000000400000-0x000000000051D000-memory.dmp
memory/2472-42-0x0000000000400000-0x0000000000415000-memory.dmp
memory/2472-39-0x0000000000400000-0x0000000000415000-memory.dmp
memory/2260-48-0x0000000000400000-0x00000000004AE000-memory.dmp
memory/4232-47-0x0000000000400000-0x000000000040F000-memory.dmp
memory/2472-58-0x0000000000400000-0x0000000000415000-memory.dmp
memory/4940-61-0x0000000000400000-0x00000000004B3000-memory.dmp
memory/4940-63-0x0000000000400000-0x00000000004B3000-memory.dmp
memory/2260-55-0x0000000000400000-0x00000000004AE000-memory.dmp
memory/4232-50-0x0000000000400000-0x000000000040F000-memory.dmp
memory/2260-66-0x0000000000400000-0x00000000004AE000-memory.dmp
memory/4232-53-0x0000000000400000-0x000000000040F000-memory.dmp
memory/4232-45-0x0000000000400000-0x000000000040F000-memory.dmp
memory/1948-78-0x0000000000400000-0x000000000043C000-memory.dmp
memory/4232-81-0x0000000000400000-0x000000000040F000-memory.dmp
memory/4560-95-0x0000000000400000-0x00000000004D5000-memory.dmp
memory/4940-98-0x0000000000400000-0x00000000004B3000-memory.dmp
memory/1268-102-0x0000000000400000-0x0000000000415000-memory.dmp
memory/2516-107-0x0000000000400000-0x000000000040F000-memory.dmp
memory/1268-108-0x0000000000400000-0x0000000000415000-memory.dmp
memory/3320-112-0x0000000000400000-0x00000000004AE000-memory.dmp
memory/2932-117-0x0000000000400000-0x00000000004B3000-memory.dmp
memory/2932-119-0x0000000000400000-0x00000000004B3000-memory.dmp
memory/2932-118-0x0000000000400000-0x00000000004B3000-memory.dmp
memory/2516-120-0x0000000000400000-0x000000000040F000-memory.dmp
memory/2932-122-0x0000000000400000-0x00000000004B3000-memory.dmp
memory/3320-121-0x0000000000400000-0x00000000004AE000-memory.dmp
memory/2932-125-0x0000000000400000-0x00000000004B3000-memory.dmp
memory/2932-128-0x0000000000400000-0x00000000004B3000-memory.dmp
memory/2932-131-0x0000000000400000-0x00000000004B3000-memory.dmp
memory/2932-134-0x0000000000400000-0x00000000004B3000-memory.dmp
memory/2932-137-0x0000000000400000-0x00000000004B3000-memory.dmp
memory/2932-140-0x0000000000400000-0x00000000004B3000-memory.dmp