Malware Analysis Report

2024-08-06 18:55

Sample ID 240620-xg2z7swfrk
Target 08cf2a748bbae2d923864859b7399b72_JaffaCakes118
SHA256 fed56117e88f7dd3664190e9dbc2b55411efe9a793aa1a7dac358d7d34f66170
Tags
darkcomet persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

fed56117e88f7dd3664190e9dbc2b55411efe9a793aa1a7dac358d7d34f66170

Threat Level: Known bad

The file 08cf2a748bbae2d923864859b7399b72_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

darkcomet persistence rat trojan

Darkcomet family

Darkcomet

Modifies WinLogon for persistence

Drops file in Drivers directory

Loads dropped DLL

Checks computer location settings

Executes dropped EXE

Adds Run key to start application

Suspicious use of SetThreadContext

Enumerates physical storage devices

Unsigned PE

Suspicious use of FindShellTrayWindow

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Modifies registry class

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-20 18:50

Signatures

Darkcomet family

darkcomet

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-20 18:50

Reported

2024-06-20 18:52

Platform

win10v2004-20240611-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\Dastan\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dastan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Dastan\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3528 set thread context of 4392 N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSecurityPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemtimePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeBackupPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeRestorePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe

"C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe"

C:\Program Files (x86)\Internet Explorer\iexplore.exe

"C:\Program Files (x86)\Internet Explorer\iexplore.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
IQ 109.127.94.69:1604 tcp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
IQ 109.127.94.69:1604 tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
IQ 109.127.94.69:1604 tcp
US 8.8.8.8:53 211.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
IQ 109.127.94.69:1604 tcp
IQ 109.127.94.69:1604 tcp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
IQ 109.127.94.69:1604 tcp
IQ 109.127.94.69:1604 tcp
US 8.8.8.8:53 131.72.42.20.in-addr.arpa udp

Files

memory/2860-0-0x0000000002260000-0x0000000002261000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe

MD5 08cf2a748bbae2d923864859b7399b72
SHA1 6dbaa83040a728d12a817c74708016f707f7a506
SHA256 fed56117e88f7dd3664190e9dbc2b55411efe9a793aa1a7dac358d7d34f66170
SHA512 6a358f1ff7d3a0263e52a4d5fcff7cb95141a93dbbaf509e9d9d85004ed291fbd4156a18b017d819cd9210c05c3f5ab657d92c6496610220298d11038b4e0e38

memory/2860-63-0x0000000000400000-0x00000000004E2000-memory.dmp

memory/3528-64-0x0000000002140000-0x0000000002141000-memory.dmp

memory/4392-65-0x0000000000400000-0x00000000004E2000-memory.dmp

memory/3528-66-0x0000000000400000-0x00000000004E2000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-20 18:50

Reported

2024-06-20 18:53

Platform

win7-20240220-en

Max time kernel

117s

Max time network

118s

Command Line

"C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\Dastan\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dastan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Dastan\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2440 set thread context of 2584 N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSecurityPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemtimePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeBackupPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeRestorePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeUndockPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeManageVolumePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\DllHost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2252 wrote to memory of 2440 N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe
PID 2252 wrote to memory of 2440 N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe
PID 2252 wrote to memory of 2440 N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe
PID 2252 wrote to memory of 2440 N/A C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe
PID 2440 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 2440 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 2440 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 2440 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 2440 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 2440 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe

Processes

C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\08cf2a748bbae2d923864859b7399b72_JaffaCakes118.exe"

C:\Windows\SysWOW64\DllHost.exe

C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}

C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe

"C:\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe"

C:\Program Files (x86)\Internet Explorer\iexplore.exe

"C:\Program Files (x86)\Internet Explorer\iexplore.exe"

Network

N/A

Files

memory/2252-0-0x00000000003F0000-0x00000000003F1000-memory.dmp

memory/2252-5-0x0000000003F30000-0x0000000003F32000-memory.dmp

memory/2672-6-0x00000000001A0000-0x00000000001A2000-memory.dmp

memory/2672-7-0x00000000002A0000-0x00000000002A1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ALI ABDOL MALEKI.JPG

MD5 fbafe329b8cd60b05438db46d69b1a1a
SHA1 d2dd1880ffff4c04286c1d5b23f8624af6160683
SHA256 1c83b9219123e039507e6e56e56b4496bb440b8199b5ed60ade18cfaeec8849f
SHA512 83c8fd83a3765d24912e707988c2c0b5418e882cf9b734ddfc915bbe33c5c1e899f2ff84d7901ddd2bdddf26f372354ac153a71051ff729b81964e458b4b9596

\Users\Admin\AppData\Local\Temp\Dastan\msdcsc.exe

MD5 08cf2a748bbae2d923864859b7399b72
SHA1 6dbaa83040a728d12a817c74708016f707f7a506
SHA256 fed56117e88f7dd3664190e9dbc2b55411efe9a793aa1a7dac358d7d34f66170
SHA512 6a358f1ff7d3a0263e52a4d5fcff7cb95141a93dbbaf509e9d9d85004ed291fbd4156a18b017d819cd9210c05c3f5ab657d92c6496610220298d11038b4e0e38

memory/2252-17-0x0000000000400000-0x00000000004E2000-memory.dmp

memory/2440-20-0x0000000000400000-0x00000000004E2000-memory.dmp

memory/2584-19-0x0000000000400000-0x00000000004E2000-memory.dmp

memory/2672-21-0x00000000002A0000-0x00000000002A1000-memory.dmp