Analysis
-
max time kernel
92s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 21:07
Static task
static1
Behavioral task
behavioral1
Sample
1787331fa3f89e5c542066c702026032_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1787331fa3f89e5c542066c702026032_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1787331fa3f89e5c542066c702026032_JaffaCakes118.exe
-
Size
667KB
-
MD5
1787331fa3f89e5c542066c702026032
-
SHA1
e0c6d3d7c959a4cdae9347ffc2f2715c0c548489
-
SHA256
c1cea27e96c5a7cee8fbb07677994a06994c797104c84a22f87563621e9a2274
-
SHA512
01547c8684f8b1eefd9d11084d43332d52fb5e41363f45946d3530ffed958053a3ee736d9438eb7f7da6b998dae14cd1b6a586c5308a24eccad411a16490e9ed
-
SSDEEP
12288:revgMsEPjD9BPde812W35dAOgrqet0k3D+EMVMKKcwHk0R8XTCAsQ429EcbxS:a4+PrMW35dAzq8rzBMqKKhHk06ueS
Malware Config
Extracted
darkcomet
Guest16
qwerrewq.no-ip.biz:82
DC_MUTEX-S1SQAX8
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
TWVVSyXJvjJa
-
install
true
-
offline_keylogger
true
-
password
0987654321
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 30 IoCs
Processes:
msdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exe1787331fa3f89e5c542066c702026032_JaffaCakes118.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Checks computer location settings 2 TTPs 30 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
msdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exe1787331fa3f89e5c542066c702026032_JaffaCakes118.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation msdcsc.exe -
Deletes itself 1 IoCs
Processes:
notepad.exepid process 1608 notepad.exe -
Executes dropped EXE 29 IoCs
Processes:
msdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exepid process 776 msdcsc.exe 588 msdcsc.exe 1648 msdcsc.exe 2716 msdcsc.exe 1028 msdcsc.exe 4832 msdcsc.exe 3196 msdcsc.exe 1884 msdcsc.exe 3256 msdcsc.exe 4808 msdcsc.exe 3188 msdcsc.exe 4340 msdcsc.exe 5032 msdcsc.exe 1656 msdcsc.exe 4556 msdcsc.exe 3372 msdcsc.exe 1936 msdcsc.exe 3480 msdcsc.exe 4884 msdcsc.exe 2812 msdcsc.exe 3724 msdcsc.exe 2292 msdcsc.exe 5004 msdcsc.exe 4324 msdcsc.exe 2128 msdcsc.exe 3000 msdcsc.exe 4828 msdcsc.exe 5024 msdcsc.exe 2396 msdcsc.exe -
Molebox Virtualization software 1 IoCs
Detects file using Molebox Virtualization software.
Processes:
resource yara_rule C:\Windows\SysWOW64\MSDCSC\msdcsc.exe molebox -
Adds Run key to start application 2 TTPs 30 IoCs
Processes:
msdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exe1787331fa3f89e5c542066c702026032_JaffaCakes118.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\TWVVSyXJvjJa\\TWVVSyXJvjJa\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Drops file in System32 directory 64 IoCs
Processes:
msdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exe1787331fa3f89e5c542066c702026032_JaffaCakes118.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\ msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\ msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\ msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\ msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\ msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
1787331fa3f89e5c542066c702026032_JaffaCakes118.exemsdcsc.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeSecurityPrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeSystemProfilePrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeSystemtimePrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeBackupPrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeRestorePrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeShutdownPrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeDebugPrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeUndockPrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeManageVolumePrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeImpersonatePrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: 33 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: 34 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: 35 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: 36 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 776 msdcsc.exe Token: SeSecurityPrivilege 776 msdcsc.exe Token: SeTakeOwnershipPrivilege 776 msdcsc.exe Token: SeLoadDriverPrivilege 776 msdcsc.exe Token: SeSystemProfilePrivilege 776 msdcsc.exe Token: SeSystemtimePrivilege 776 msdcsc.exe Token: SeProfSingleProcessPrivilege 776 msdcsc.exe Token: SeIncBasePriorityPrivilege 776 msdcsc.exe Token: SeCreatePagefilePrivilege 776 msdcsc.exe Token: SeBackupPrivilege 776 msdcsc.exe Token: SeRestorePrivilege 776 msdcsc.exe Token: SeShutdownPrivilege 776 msdcsc.exe Token: SeDebugPrivilege 776 msdcsc.exe Token: SeSystemEnvironmentPrivilege 776 msdcsc.exe Token: SeChangeNotifyPrivilege 776 msdcsc.exe Token: SeRemoteShutdownPrivilege 776 msdcsc.exe Token: SeUndockPrivilege 776 msdcsc.exe Token: SeManageVolumePrivilege 776 msdcsc.exe Token: SeImpersonatePrivilege 776 msdcsc.exe Token: SeCreateGlobalPrivilege 776 msdcsc.exe Token: 33 776 msdcsc.exe Token: 34 776 msdcsc.exe Token: 35 776 msdcsc.exe Token: 36 776 msdcsc.exe Token: SeIncreaseQuotaPrivilege 588 msdcsc.exe Token: SeSecurityPrivilege 588 msdcsc.exe Token: SeTakeOwnershipPrivilege 588 msdcsc.exe Token: SeLoadDriverPrivilege 588 msdcsc.exe Token: SeSystemProfilePrivilege 588 msdcsc.exe Token: SeSystemtimePrivilege 588 msdcsc.exe Token: SeProfSingleProcessPrivilege 588 msdcsc.exe Token: SeIncBasePriorityPrivilege 588 msdcsc.exe Token: SeCreatePagefilePrivilege 588 msdcsc.exe Token: SeBackupPrivilege 588 msdcsc.exe Token: SeRestorePrivilege 588 msdcsc.exe Token: SeShutdownPrivilege 588 msdcsc.exe Token: SeDebugPrivilege 588 msdcsc.exe Token: SeSystemEnvironmentPrivilege 588 msdcsc.exe Token: SeChangeNotifyPrivilege 588 msdcsc.exe Token: SeRemoteShutdownPrivilege 588 msdcsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1787331fa3f89e5c542066c702026032_JaffaCakes118.exemsdcsc.exemsdcsc.exemsdcsc.exedescription pid process target process PID 3368 wrote to memory of 1608 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe notepad.exe PID 3368 wrote to memory of 1608 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe notepad.exe PID 3368 wrote to memory of 1608 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe notepad.exe PID 3368 wrote to memory of 1608 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe notepad.exe PID 3368 wrote to memory of 1608 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe notepad.exe PID 3368 wrote to memory of 1608 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe notepad.exe PID 3368 wrote to memory of 1608 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe notepad.exe PID 3368 wrote to memory of 1608 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe notepad.exe PID 3368 wrote to memory of 1608 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe notepad.exe PID 3368 wrote to memory of 1608 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe notepad.exe PID 3368 wrote to memory of 1608 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe notepad.exe PID 3368 wrote to memory of 1608 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe notepad.exe PID 3368 wrote to memory of 1608 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe notepad.exe PID 3368 wrote to memory of 1608 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe notepad.exe PID 3368 wrote to memory of 1608 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe notepad.exe PID 3368 wrote to memory of 1608 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe notepad.exe PID 3368 wrote to memory of 1608 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe notepad.exe PID 3368 wrote to memory of 776 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe msdcsc.exe PID 3368 wrote to memory of 776 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe msdcsc.exe PID 3368 wrote to memory of 776 3368 1787331fa3f89e5c542066c702026032_JaffaCakes118.exe msdcsc.exe PID 776 wrote to memory of 3848 776 msdcsc.exe notepad.exe PID 776 wrote to memory of 3848 776 msdcsc.exe notepad.exe PID 776 wrote to memory of 3848 776 msdcsc.exe notepad.exe PID 776 wrote to memory of 3848 776 msdcsc.exe notepad.exe PID 776 wrote to memory of 3848 776 msdcsc.exe notepad.exe PID 776 wrote to memory of 3848 776 msdcsc.exe notepad.exe PID 776 wrote to memory of 3848 776 msdcsc.exe notepad.exe PID 776 wrote to memory of 3848 776 msdcsc.exe notepad.exe PID 776 wrote to memory of 3848 776 msdcsc.exe notepad.exe PID 776 wrote to memory of 3848 776 msdcsc.exe notepad.exe PID 776 wrote to memory of 3848 776 msdcsc.exe notepad.exe PID 776 wrote to memory of 3848 776 msdcsc.exe notepad.exe PID 776 wrote to memory of 3848 776 msdcsc.exe notepad.exe PID 776 wrote to memory of 3848 776 msdcsc.exe notepad.exe PID 776 wrote to memory of 3848 776 msdcsc.exe notepad.exe PID 776 wrote to memory of 3848 776 msdcsc.exe notepad.exe PID 776 wrote to memory of 3848 776 msdcsc.exe notepad.exe PID 776 wrote to memory of 588 776 msdcsc.exe msdcsc.exe PID 776 wrote to memory of 588 776 msdcsc.exe msdcsc.exe PID 776 wrote to memory of 588 776 msdcsc.exe msdcsc.exe PID 588 wrote to memory of 2820 588 msdcsc.exe notepad.exe PID 588 wrote to memory of 2820 588 msdcsc.exe notepad.exe PID 588 wrote to memory of 2820 588 msdcsc.exe notepad.exe PID 588 wrote to memory of 2820 588 msdcsc.exe notepad.exe PID 588 wrote to memory of 2820 588 msdcsc.exe notepad.exe PID 588 wrote to memory of 2820 588 msdcsc.exe notepad.exe PID 588 wrote to memory of 2820 588 msdcsc.exe notepad.exe PID 588 wrote to memory of 2820 588 msdcsc.exe notepad.exe PID 588 wrote to memory of 2820 588 msdcsc.exe notepad.exe PID 588 wrote to memory of 2820 588 msdcsc.exe notepad.exe PID 588 wrote to memory of 2820 588 msdcsc.exe notepad.exe PID 588 wrote to memory of 2820 588 msdcsc.exe notepad.exe PID 588 wrote to memory of 2820 588 msdcsc.exe notepad.exe PID 588 wrote to memory of 2820 588 msdcsc.exe notepad.exe PID 588 wrote to memory of 2820 588 msdcsc.exe notepad.exe PID 588 wrote to memory of 2820 588 msdcsc.exe notepad.exe PID 588 wrote to memory of 2820 588 msdcsc.exe notepad.exe PID 588 wrote to memory of 1648 588 msdcsc.exe msdcsc.exe PID 588 wrote to memory of 1648 588 msdcsc.exe msdcsc.exe PID 588 wrote to memory of 1648 588 msdcsc.exe msdcsc.exe PID 1648 wrote to memory of 3736 1648 msdcsc.exe notepad.exe PID 1648 wrote to memory of 3736 1648 msdcsc.exe notepad.exe PID 1648 wrote to memory of 3736 1648 msdcsc.exe notepad.exe PID 1648 wrote to memory of 3736 1648 msdcsc.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1787331fa3f89e5c542066c702026032_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1787331fa3f89e5c542066c702026032_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- Deletes itself
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"3⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad4⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad5⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"5⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad6⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"6⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad7⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"7⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad8⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"8⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad9⤵
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"9⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad10⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"10⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad11⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"11⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad12⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"12⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad13⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"13⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad14⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"14⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad15⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"15⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad16⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"16⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad17⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"17⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad18⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"18⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\notepad.exenotepad19⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"19⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad20⤵
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"20⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad21⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"21⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad22⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"22⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad23⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"23⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad24⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"24⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad25⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"25⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad26⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"26⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad27⤵
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"27⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad28⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"28⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad29⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\TWVVSyXJvjJa\msdcsc.exe"29⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad30⤵
-
C:\Windows\SysWOW64\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"C:\Windows\system32\MSDCSC\TWVVSyXJvjJa\msdcsc.exe"30⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\notepad.exenotepad31⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exeFilesize
667KB
MD51787331fa3f89e5c542066c702026032
SHA1e0c6d3d7c959a4cdae9347ffc2f2715c0c548489
SHA256c1cea27e96c5a7cee8fbb07677994a06994c797104c84a22f87563621e9a2274
SHA51201547c8684f8b1eefd9d11084d43332d52fb5e41363f45946d3530ffed958053a3ee736d9438eb7f7da6b998dae14cd1b6a586c5308a24eccad411a16490e9ed
-
memory/588-71-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/588-56-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/776-39-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/776-32-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/776-34-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/776-35-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/776-36-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/776-57-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/776-38-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/776-33-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/776-55-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/776-40-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/776-27-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/1028-117-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/1028-103-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/1608-30-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/1608-44-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/1608-12-0x0000000001090000-0x0000000001091000-memory.dmpFilesize
4KB
-
memory/1648-72-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/1648-86-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/1656-245-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/1656-258-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/1884-166-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/1884-151-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/1936-288-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/1936-302-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/2716-88-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/2716-101-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/3188-199-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/3188-215-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/3196-149-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/3196-133-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/3256-182-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/3256-168-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/3368-4-0x0000000002220000-0x0000000002230000-memory.dmpFilesize
64KB
-
memory/3368-13-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/3368-9-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/3368-5-0x0000000077BC2000-0x0000000077BC3000-memory.dmpFilesize
4KB
-
memory/3368-8-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/3368-15-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/3368-14-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/3368-1-0x0000000000B00000-0x0000000000B01000-memory.dmpFilesize
4KB
-
memory/3368-2-0x0000000002150000-0x000000000219E000-memory.dmpFilesize
312KB
-
memory/3368-26-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/3368-28-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/3368-31-0x0000000075DA0000-0x0000000075E90000-memory.dmpFilesize
960KB
-
memory/3368-0-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/3368-6-0x00000000023C0000-0x00000000023D0000-memory.dmpFilesize
64KB
-
memory/3368-29-0x0000000002150000-0x000000000219E000-memory.dmpFilesize
312KB
-
memory/3368-3-0x00000000021D0000-0x00000000021E0000-memory.dmpFilesize
64KB
-
memory/3368-7-0x0000000075DC0000-0x0000000075DC1000-memory.dmpFilesize
4KB
-
memory/3372-275-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/3372-289-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/3480-304-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/4340-214-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/4340-229-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/4556-260-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/4556-273-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/4808-184-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/4808-200-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/4832-131-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/4832-118-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/5032-243-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB
-
memory/5032-230-0x0000000000400000-0x00000000004F3000-memory.dmpFilesize
972KB