Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 15:29
Behavioral task
behavioral1
Sample
074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe
-
Size
1015KB
-
MD5
074b37dbc85dcc235f8f6f33a1d56953
-
SHA1
e36b7444d38ad4026937824101ce5e6c17a1dc19
-
SHA256
a9e50afef81424a18bc6013efabd3710f0e74d32a2ea8bf031e27b7f59ff2d03
-
SHA512
cd3f83604ed6f9e845ebcc8adc428a428888d76e879f84e011cb1b2633231ea7415028526d43bf997c61f4e1722c239f677dd77b8be1adb136da39c6ac7d2b82
-
SSDEEP
24576:PaMw2WWeFcfbP9VPSPMTSPL/rWvzq4JJfpks6SXsa:dLbVMTrOq4YSXsa
Malware Config
Extracted
darkcomet
all.tamashi.ge
jajaxparkour.no-ip.org:81
jajaxparkour.no-ip.org:82
jajaxparkour.no-ip.org:83
DC_MUTEX-HNXAZ4N
-
InstallPath
msdcsc.exe
-
gencode
JmA4p7WaU7N1
-
install
true
-
offline_keylogger
true
-
password
jajaXparkourjajaXparkour
-
persistence
true
-
reg_key
WinUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
alltamashige.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\msdcsc.exe" alltamashige.exe -
Modifies firewall policy service 3 TTPs 6 IoCs
Processes:
msdcsc.exeiexplore.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" iexplore.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe -
Modifies security service 2 TTPs 2 IoCs
Processes:
msdcsc.exeiexplore.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" iexplore.exe -
Processes:
msdcsc.exeiexplore.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" iexplore.exe -
Drops file in Drivers directory 1 IoCs
Processes:
alltamashige.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts alltamashige.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 2820 attrib.exe 3012 attrib.exe -
Executes dropped EXE 6 IoCs
Processes:
cmd.exealltamashige.exesvchost.exealltamashige.exesvchost.exemsdcsc.exepid process 2924 cmd.exe 2508 alltamashige.exe 2636 svchost.exe 2588 alltamashige.exe 2644 svchost.exe 2488 msdcsc.exe -
Loads dropped DLL 5 IoCs
Processes:
074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exesvchost.exepid process 1640 074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe 1640 074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe 1640 074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe 2636 svchost.exe 2636 svchost.exe -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
alltamashige.exemsdcsc.exeiexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Windows\\msdcsc.exe" alltamashige.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Windows\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Windows\\msdcsc.exe" iexplore.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
msdcsc.exedescription pid process target process PID 2488 set thread context of 1852 2488 msdcsc.exe iexplore.exe -
Drops file in Program Files directory 39 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe svchost.exe -
Drops file in Windows directory 4 IoCs
Processes:
alltamashige.exealltamashige.exedescription ioc process File created C:\Windows\svchost.exe alltamashige.exe File created C:\Windows\msdcsc.exe alltamashige.exe File opened for modification C:\Windows\msdcsc.exe alltamashige.exe File opened for modification C:\Windows\ alltamashige.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 1852 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
alltamashige.exemsdcsc.exeiexplore.exedescription pid process Token: SeIncreaseQuotaPrivilege 2588 alltamashige.exe Token: SeSecurityPrivilege 2588 alltamashige.exe Token: SeTakeOwnershipPrivilege 2588 alltamashige.exe Token: SeLoadDriverPrivilege 2588 alltamashige.exe Token: SeSystemProfilePrivilege 2588 alltamashige.exe Token: SeSystemtimePrivilege 2588 alltamashige.exe Token: SeProfSingleProcessPrivilege 2588 alltamashige.exe Token: SeIncBasePriorityPrivilege 2588 alltamashige.exe Token: SeCreatePagefilePrivilege 2588 alltamashige.exe Token: SeBackupPrivilege 2588 alltamashige.exe Token: SeRestorePrivilege 2588 alltamashige.exe Token: SeShutdownPrivilege 2588 alltamashige.exe Token: SeDebugPrivilege 2588 alltamashige.exe Token: SeSystemEnvironmentPrivilege 2588 alltamashige.exe Token: SeChangeNotifyPrivilege 2588 alltamashige.exe Token: SeRemoteShutdownPrivilege 2588 alltamashige.exe Token: SeUndockPrivilege 2588 alltamashige.exe Token: SeManageVolumePrivilege 2588 alltamashige.exe Token: SeImpersonatePrivilege 2588 alltamashige.exe Token: SeCreateGlobalPrivilege 2588 alltamashige.exe Token: 33 2588 alltamashige.exe Token: 34 2588 alltamashige.exe Token: 35 2588 alltamashige.exe Token: SeIncreaseQuotaPrivilege 2488 msdcsc.exe Token: SeSecurityPrivilege 2488 msdcsc.exe Token: SeTakeOwnershipPrivilege 2488 msdcsc.exe Token: SeLoadDriverPrivilege 2488 msdcsc.exe Token: SeSystemProfilePrivilege 2488 msdcsc.exe Token: SeSystemtimePrivilege 2488 msdcsc.exe Token: SeProfSingleProcessPrivilege 2488 msdcsc.exe Token: SeIncBasePriorityPrivilege 2488 msdcsc.exe Token: SeCreatePagefilePrivilege 2488 msdcsc.exe Token: SeBackupPrivilege 2488 msdcsc.exe Token: SeRestorePrivilege 2488 msdcsc.exe Token: SeShutdownPrivilege 2488 msdcsc.exe Token: SeDebugPrivilege 2488 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2488 msdcsc.exe Token: SeChangeNotifyPrivilege 2488 msdcsc.exe Token: SeRemoteShutdownPrivilege 2488 msdcsc.exe Token: SeUndockPrivilege 2488 msdcsc.exe Token: SeManageVolumePrivilege 2488 msdcsc.exe Token: SeImpersonatePrivilege 2488 msdcsc.exe Token: SeCreateGlobalPrivilege 2488 msdcsc.exe Token: 33 2488 msdcsc.exe Token: 34 2488 msdcsc.exe Token: 35 2488 msdcsc.exe Token: SeIncreaseQuotaPrivilege 1852 iexplore.exe Token: SeSecurityPrivilege 1852 iexplore.exe Token: SeTakeOwnershipPrivilege 1852 iexplore.exe Token: SeLoadDriverPrivilege 1852 iexplore.exe Token: SeSystemProfilePrivilege 1852 iexplore.exe Token: SeSystemtimePrivilege 1852 iexplore.exe Token: SeProfSingleProcessPrivilege 1852 iexplore.exe Token: SeIncBasePriorityPrivilege 1852 iexplore.exe Token: SeCreatePagefilePrivilege 1852 iexplore.exe Token: SeBackupPrivilege 1852 iexplore.exe Token: SeRestorePrivilege 1852 iexplore.exe Token: SeShutdownPrivilege 1852 iexplore.exe Token: SeDebugPrivilege 1852 iexplore.exe Token: SeSystemEnvironmentPrivilege 1852 iexplore.exe Token: SeChangeNotifyPrivilege 1852 iexplore.exe Token: SeRemoteShutdownPrivilege 1852 iexplore.exe Token: SeUndockPrivilege 1852 iexplore.exe Token: SeManageVolumePrivilege 1852 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
iexplore.exepid process 1852 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exealltamashige.exesvchost.exealltamashige.execmd.execmd.exemsdcsc.exeiexplore.exedescription pid process target process PID 1640 wrote to memory of 2924 1640 074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe cmd.exe PID 1640 wrote to memory of 2924 1640 074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe cmd.exe PID 1640 wrote to memory of 2924 1640 074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe cmd.exe PID 1640 wrote to memory of 2924 1640 074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe cmd.exe PID 1640 wrote to memory of 2508 1640 074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe alltamashige.exe PID 1640 wrote to memory of 2508 1640 074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe alltamashige.exe PID 1640 wrote to memory of 2508 1640 074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe alltamashige.exe PID 1640 wrote to memory of 2508 1640 074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe alltamashige.exe PID 2508 wrote to memory of 2636 2508 alltamashige.exe svchost.exe PID 2508 wrote to memory of 2636 2508 alltamashige.exe svchost.exe PID 2508 wrote to memory of 2636 2508 alltamashige.exe svchost.exe PID 2508 wrote to memory of 2636 2508 alltamashige.exe svchost.exe PID 2636 wrote to memory of 2588 2636 svchost.exe alltamashige.exe PID 2636 wrote to memory of 2588 2636 svchost.exe alltamashige.exe PID 2636 wrote to memory of 2588 2636 svchost.exe alltamashige.exe PID 2636 wrote to memory of 2588 2636 svchost.exe alltamashige.exe PID 2588 wrote to memory of 2276 2588 alltamashige.exe cmd.exe PID 2588 wrote to memory of 2276 2588 alltamashige.exe cmd.exe PID 2588 wrote to memory of 2276 2588 alltamashige.exe cmd.exe PID 2588 wrote to memory of 2276 2588 alltamashige.exe cmd.exe PID 2588 wrote to memory of 2364 2588 alltamashige.exe cmd.exe PID 2588 wrote to memory of 2364 2588 alltamashige.exe cmd.exe PID 2588 wrote to memory of 2364 2588 alltamashige.exe cmd.exe PID 2588 wrote to memory of 2364 2588 alltamashige.exe cmd.exe PID 2588 wrote to memory of 2488 2588 alltamashige.exe msdcsc.exe PID 2588 wrote to memory of 2488 2588 alltamashige.exe msdcsc.exe PID 2588 wrote to memory of 2488 2588 alltamashige.exe msdcsc.exe PID 2588 wrote to memory of 2488 2588 alltamashige.exe msdcsc.exe PID 2364 wrote to memory of 3012 2364 cmd.exe attrib.exe PID 2364 wrote to memory of 3012 2364 cmd.exe attrib.exe PID 2364 wrote to memory of 3012 2364 cmd.exe attrib.exe PID 2364 wrote to memory of 3012 2364 cmd.exe attrib.exe PID 2276 wrote to memory of 2820 2276 cmd.exe attrib.exe PID 2276 wrote to memory of 2820 2276 cmd.exe attrib.exe PID 2276 wrote to memory of 2820 2276 cmd.exe attrib.exe PID 2276 wrote to memory of 2820 2276 cmd.exe attrib.exe PID 2488 wrote to memory of 1852 2488 msdcsc.exe iexplore.exe PID 2488 wrote to memory of 1852 2488 msdcsc.exe iexplore.exe PID 2488 wrote to memory of 1852 2488 msdcsc.exe iexplore.exe PID 2488 wrote to memory of 1852 2488 msdcsc.exe iexplore.exe PID 2488 wrote to memory of 1852 2488 msdcsc.exe iexplore.exe PID 2488 wrote to memory of 1852 2488 msdcsc.exe iexplore.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe PID 1852 wrote to memory of 1252 1852 iexplore.exe notepad.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 2820 attrib.exe 3012 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe"C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe"C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe"C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe"4⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe" +s +h5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\alltamashige.exe" +s +h6⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\%temp%" +s +h5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp" +s +h6⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\msdcsc.exe"C:\Windows\msdcsc.exe"5⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"6⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad7⤵
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exeFilesize
697KB
MD525a7087745e3be52602ed9a2b753fb92
SHA19baf48e9603f4a4e478a856bd2bf08a0522001f3
SHA256c93cc41f09f3fc4dcbe7013e1705fad1f54ffea6978cc53935a5c426cb271a0e
SHA512ee04c15369a18f5c8b858fb7c441ed47f955d13e8048ee19ca23aa701bf6786c414944a36f0967c640723f493aabc62b2c9d9484067b4f8874a050eef3a8a65e
-
C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exeFilesize
661KB
MD54caab89f32f901eea758095fc05173d5
SHA1f1440d734982b2f7d3536f8a0ea2246f3b2ff8e4
SHA25613e040a602b573848e1d9a6f60944271efcff6251c25a39f9aa98eb2c77dc477
SHA51273713e2edd11203c2359181621032565197912b144cb0d3177a1f796a413e7fd1a698c964b45a0774647d1bc4b085d90bc7521535dd7e9989bb4b7d5fda75e33
-
C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exeFilesize
295KB
MD5ad7b9c14083b52bc532fba5948342b98
SHA1ee8cbf12d87c4d388f09b4f69bed2e91682920b5
SHA25617f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae
SHA512e12aad20c824187b39edb3c7943709290b5ddbf1b4032988db46f2e86da3cf7e7783f78c82e4dc5da232f666b8f9799a260a1f8e2694eb4d0cdaf78da710fde1
-
C:\Windows\svchost.exeFilesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
memory/1252-55-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/1252-93-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1640-18-0x0000000000400000-0x000000000040D000-memory.dmpFilesize
52KB
-
memory/1852-53-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2488-54-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2508-25-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/2588-50-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/2636-38-0x0000000000400000-0x000000000040D000-memory.dmpFilesize
52KB
-
memory/2644-96-0x0000000000400000-0x000000000040D000-memory.dmpFilesize
52KB
-
memory/2644-102-0x0000000000400000-0x000000000040D000-memory.dmpFilesize
52KB
-
memory/2644-111-0x0000000000400000-0x000000000040D000-memory.dmpFilesize
52KB