Malware Analysis Report

2024-08-06 18:57

Sample ID 240620-sw5bnavbqh
Target 074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118
SHA256 a9e50afef81424a18bc6013efabd3710f0e74d32a2ea8bf031e27b7f59ff2d03
Tags
darkcomet all.tamashi.ge evasion persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a9e50afef81424a18bc6013efabd3710f0e74d32a2ea8bf031e27b7f59ff2d03

Threat Level: Known bad

The file 074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

darkcomet all.tamashi.ge evasion persistence rat trojan

Darkcomet family

Darkcomet

Modifies security service

Modifies firewall policy service

Windows security bypass

Modifies WinLogon for persistence

Sets file to hidden

Drops file in Drivers directory

Windows security modification

Loads dropped DLL

Executes dropped EXE

Checks computer location settings

Adds Run key to start application

Suspicious use of SetThreadContext

Drops file in Windows directory

Drops file in Program Files directory

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Views/modifies file attributes

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-20 15:29

Signatures

Darkcomet family

darkcomet

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-20 15:29

Reported

2024-06-20 15:32

Platform

win7-20240221-en

Max time kernel

150s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A

Modifies firewall policy service

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Windows\msdcsc.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" C:\Windows\msdcsc.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Windows\msdcsc.exe N/A

Modifies security service

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" C:\Windows\msdcsc.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Windows\msdcsc.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Windows\msdcsc.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Windows\msdcsc.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Windows\msdcsc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Windows\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Windows\\msdcsc.exe" C:\Windows\msdcsc.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Windows\\msdcsc.exe" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2488 set thread context of 1852 N/A C:\Windows\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\7-Zip\Uninstall.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\7-Zip\7zG.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\7-Zip\7z.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\7-Zip\7zFM.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe C:\Windows\svchost.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
File created C:\Windows\msdcsc.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
File opened for modification C:\Windows\msdcsc.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
File opened for modification C:\Windows\ C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: 33 N/A C:\Windows\msdcsc.exe N/A
Token: 34 N/A C:\Windows\msdcsc.exe N/A
Token: 35 N/A C:\Windows\msdcsc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSecurityPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemtimePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeBackupPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeRestorePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeUndockPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeManageVolumePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1640 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe
PID 1640 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe
PID 1640 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe
PID 1640 wrote to memory of 2924 N/A C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe
PID 1640 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
PID 1640 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
PID 1640 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
PID 1640 wrote to memory of 2508 N/A C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
PID 2508 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\svchost.exe
PID 2508 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\svchost.exe
PID 2508 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\svchost.exe
PID 2508 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\svchost.exe
PID 2636 wrote to memory of 2588 N/A C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
PID 2636 wrote to memory of 2588 N/A C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
PID 2636 wrote to memory of 2588 N/A C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
PID 2636 wrote to memory of 2588 N/A C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
PID 2588 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\SysWOW64\cmd.exe
PID 2588 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\SysWOW64\cmd.exe
PID 2588 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\SysWOW64\cmd.exe
PID 2588 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\SysWOW64\cmd.exe
PID 2588 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\SysWOW64\cmd.exe
PID 2588 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\SysWOW64\cmd.exe
PID 2588 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\SysWOW64\cmd.exe
PID 2588 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\SysWOW64\cmd.exe
PID 2588 wrote to memory of 2488 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\msdcsc.exe
PID 2588 wrote to memory of 2488 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\msdcsc.exe
PID 2588 wrote to memory of 2488 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\msdcsc.exe
PID 2588 wrote to memory of 2488 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\msdcsc.exe
PID 2364 wrote to memory of 3012 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2364 wrote to memory of 3012 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2364 wrote to memory of 3012 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2364 wrote to memory of 3012 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2276 wrote to memory of 2820 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2276 wrote to memory of 2820 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2276 wrote to memory of 2820 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2276 wrote to memory of 2820 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2488 wrote to memory of 1852 N/A C:\Windows\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 2488 wrote to memory of 1852 N/A C:\Windows\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 2488 wrote to memory of 1852 N/A C:\Windows\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 2488 wrote to memory of 1852 N/A C:\Windows\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 2488 wrote to memory of 1852 N/A C:\Windows\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 2488 wrote to memory of 1852 N/A C:\Windows\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe
PID 1852 wrote to memory of 1252 N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Windows\SysWOW64\notepad.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe

"C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe"

C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe

"C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe"

C:\Windows\svchost.exe

"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe"

C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe

"C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe"

C:\Windows\svchost.exe

C:\Windows\svchost.exe

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe" +s +h

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\%temp%" +s +h

C:\Windows\msdcsc.exe

"C:\Windows\msdcsc.exe"

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp" +s +h

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\alltamashige.exe" +s +h

C:\Program Files (x86)\Internet Explorer\iexplore.exe

"C:\Program Files (x86)\Internet Explorer\iexplore.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

Network

Country Destination Domain Proto
US 8.8.8.8:53 jajaxparkour.no-ip.org udp

Files

C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe

MD5 ad7b9c14083b52bc532fba5948342b98
SHA1 ee8cbf12d87c4d388f09b4f69bed2e91682920b5
SHA256 17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae
SHA512 e12aad20c824187b39edb3c7943709290b5ddbf1b4032988db46f2e86da3cf7e7783f78c82e4dc5da232f666b8f9799a260a1f8e2694eb4d0cdaf78da710fde1

C:\Windows\svchost.exe

MD5 9e3c13b6556d5636b745d3e466d47467
SHA1 2ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA256 20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA512 5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

memory/2508-25-0x0000000000400000-0x0000000000411000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe

MD5 25a7087745e3be52602ed9a2b753fb92
SHA1 9baf48e9603f4a4e478a856bd2bf08a0522001f3
SHA256 c93cc41f09f3fc4dcbe7013e1705fad1f54ffea6978cc53935a5c426cb271a0e
SHA512 ee04c15369a18f5c8b858fb7c441ed47f955d13e8048ee19ca23aa701bf6786c414944a36f0967c640723f493aabc62b2c9d9484067b4f8874a050eef3a8a65e

memory/1640-18-0x0000000000400000-0x000000000040D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe

MD5 4caab89f32f901eea758095fc05173d5
SHA1 f1440d734982b2f7d3536f8a0ea2246f3b2ff8e4
SHA256 13e040a602b573848e1d9a6f60944271efcff6251c25a39f9aa98eb2c77dc477
SHA512 73713e2edd11203c2359181621032565197912b144cb0d3177a1f796a413e7fd1a698c964b45a0774647d1bc4b085d90bc7521535dd7e9989bb4b7d5fda75e33

memory/2636-38-0x0000000000400000-0x000000000040D000-memory.dmp

memory/2588-50-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2488-54-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/1852-53-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/1252-93-0x00000000001E0000-0x00000000001E1000-memory.dmp

memory/1252-55-0x0000000000080000-0x0000000000081000-memory.dmp

memory/2644-96-0x0000000000400000-0x000000000040D000-memory.dmp

memory/2644-102-0x0000000000400000-0x000000000040D000-memory.dmp

memory/2644-111-0x0000000000400000-0x000000000040D000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-20 15:29

Reported

2024-06-20 15:32

Platform

win10v2004-20240611-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A

Modifies firewall policy service

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Windows\msdcsc.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" C:\Windows\msdcsc.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Windows\msdcsc.exe N/A

Modifies security service

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" C:\Windows\msdcsc.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Windows\msdcsc.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Windows\msdcsc.exe N/A

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Windows\msdcsc.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Windows\msdcsc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Windows\\msdcsc.exe" C:\Windows\msdcsc.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinUpdate = "C:\\Windows\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\chrome_pwa_launcher.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\notification_helper.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\7-Zip\7zFM.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\7-Zip\Uninstall.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\7-Zip\7z.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\7-Zip\7zG.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\dotnet\dotnet.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe C:\Windows\svchost.exe N/A
File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe C:\Windows\svchost.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\msdcsc.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
File opened for modification C:\Windows\msdcsc.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
File opened for modification C:\Windows\ C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
File created C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\msdcsc.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\Windows\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\msdcsc.exe N/A
Token: 33 N/A C:\Windows\msdcsc.exe N/A
Token: 34 N/A C:\Windows\msdcsc.exe N/A
Token: 35 N/A C:\Windows\msdcsc.exe N/A
Token: 36 N/A C:\Windows\msdcsc.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\msdcsc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 5112 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe
PID 5112 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe
PID 5112 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe
PID 5112 wrote to memory of 3368 N/A C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
PID 5112 wrote to memory of 3368 N/A C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
PID 5112 wrote to memory of 3368 N/A C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
PID 3368 wrote to memory of 4904 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\svchost.exe
PID 3368 wrote to memory of 4904 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\svchost.exe
PID 3368 wrote to memory of 4904 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\svchost.exe
PID 4904 wrote to memory of 4208 N/A C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
PID 4904 wrote to memory of 4208 N/A C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
PID 4904 wrote to memory of 4208 N/A C:\Windows\svchost.exe C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe
PID 4208 wrote to memory of 1588 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\SysWOW64\cmd.exe
PID 4208 wrote to memory of 1588 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\SysWOW64\cmd.exe
PID 4208 wrote to memory of 1588 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\SysWOW64\cmd.exe
PID 4208 wrote to memory of 3424 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\SysWOW64\cmd.exe
PID 4208 wrote to memory of 3424 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\SysWOW64\cmd.exe
PID 4208 wrote to memory of 3424 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\SysWOW64\cmd.exe
PID 4208 wrote to memory of 3588 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\msdcsc.exe
PID 4208 wrote to memory of 3588 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\msdcsc.exe
PID 4208 wrote to memory of 3588 N/A C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe C:\Windows\msdcsc.exe
PID 1588 wrote to memory of 1996 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 1588 wrote to memory of 1996 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 1588 wrote to memory of 1996 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 3424 wrote to memory of 2412 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 3424 wrote to memory of 2412 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 3424 wrote to memory of 2412 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 3588 wrote to memory of 4092 N/A C:\Windows\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 3588 wrote to memory of 4092 N/A C:\Windows\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 3588 wrote to memory of 4092 N/A C:\Windows\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 3588 wrote to memory of 4772 N/A C:\Windows\msdcsc.exe C:\Windows\explorer.exe
PID 3588 wrote to memory of 4772 N/A C:\Windows\msdcsc.exe C:\Windows\explorer.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe
PID 3588 wrote to memory of 1768 N/A C:\Windows\msdcsc.exe C:\Windows\notepad.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\074b37dbc85dcc235f8f6f33a1d56953_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe

"C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe"

C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe

"C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe"

C:\Windows\svchost.exe

"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe"

C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe

"C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe"

C:\Windows\svchost.exe

C:\Windows\svchost.exe

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe" +s +h

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\%temp%" +s +h

C:\Windows\msdcsc.exe

"C:\Windows\msdcsc.exe"

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\alltamashige.exe" +s +h

C:\Program Files (x86)\Internet Explorer\iexplore.exe

"C:\Program Files (x86)\Internet Explorer\iexplore.exe"

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp" +s +h

C:\Windows\explorer.exe

"C:\Windows\explorer.exe"

C:\Windows\notepad.exe

notepad

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
NL 23.62.61.99:443 www.bing.com tcp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 99.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 92.12.20.2.in-addr.arpa udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 jajaxparkour.no-ip.org udp
US 8.8.8.8:53 10.179.89.13.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\%temp%\cmd.exe

MD5 ad7b9c14083b52bc532fba5948342b98
SHA1 ee8cbf12d87c4d388f09b4f69bed2e91682920b5
SHA256 17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae
SHA512 e12aad20c824187b39edb3c7943709290b5ddbf1b4032988db46f2e86da3cf7e7783f78c82e4dc5da232f666b8f9799a260a1f8e2694eb4d0cdaf78da710fde1

C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe

MD5 25a7087745e3be52602ed9a2b753fb92
SHA1 9baf48e9603f4a4e478a856bd2bf08a0522001f3
SHA256 c93cc41f09f3fc4dcbe7013e1705fad1f54ffea6978cc53935a5c426cb271a0e
SHA512 ee04c15369a18f5c8b858fb7c441ed47f955d13e8048ee19ca23aa701bf6786c414944a36f0967c640723f493aabc62b2c9d9484067b4f8874a050eef3a8a65e

C:\Windows\svchost.exe

MD5 9e3c13b6556d5636b745d3e466d47467
SHA1 2ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA256 20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA512 5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

memory/3368-28-0x0000000000400000-0x0000000000411000-memory.dmp

memory/5112-25-0x0000000000400000-0x000000000040D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\%temp%\alltamashige.exe

MD5 4caab89f32f901eea758095fc05173d5
SHA1 f1440d734982b2f7d3536f8a0ea2246f3b2ff8e4
SHA256 13e040a602b573848e1d9a6f60944271efcff6251c25a39f9aa98eb2c77dc477
SHA512 73713e2edd11203c2359181621032565197912b144cb0d3177a1f796a413e7fd1a698c964b45a0774647d1bc4b085d90bc7521535dd7e9989bb4b7d5fda75e33

memory/4904-36-0x0000000000400000-0x000000000040D000-memory.dmp

memory/4208-37-0x00000000022B0000-0x00000000022B1000-memory.dmp

memory/4208-53-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4352-55-0x0000000000400000-0x000000000040D000-memory.dmp

memory/3588-56-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/3588-58-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/3588-60-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/3588-62-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/3588-64-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4352-65-0x0000000000400000-0x000000000040D000-memory.dmp

memory/3588-66-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/3588-68-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/3588-70-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/3588-72-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4352-73-0x0000000000400000-0x000000000040D000-memory.dmp

memory/3588-74-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/3588-76-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/3588-78-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/3588-80-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/3588-82-0x0000000000400000-0x00000000004B5000-memory.dmp