Malware Analysis Report

2024-08-06 17:30

Sample ID 240702-exfg2ayhlk
Target 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118
SHA256 803c89efe08eb9dd7dc35bd886818e61ffa82762d75f63c9d2691dd66e703524
Tags
darkcomet latentbot guest16 evasion persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

803c89efe08eb9dd7dc35bd886818e61ffa82762d75f63c9d2691dd66e703524

Threat Level: Known bad

The file 1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

darkcomet latentbot guest16 evasion persistence rat trojan

LatentBot

Windows security bypass

Modifies WinLogon for persistence

Darkcomet

Sets file to hidden

Executes dropped EXE

Checks computer location settings

Windows security modification

Loads dropped DLL

Adds Run key to start application

Drops file in System32 directory

Program crash

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Views/modifies file attributes

Suspicious behavior: GetForegroundWindowSpam

Modifies registry class

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-07-02 04:18

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-02 04:18

Reported

2024-07-02 04:21

Platform

win10v2004-20240611-en

Max time kernel

150s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

LatentBot

trojan latentbot

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\ C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: 36 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 384 wrote to memory of 3344 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 384 wrote to memory of 3344 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 384 wrote to memory of 3344 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 384 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 384 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 384 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2668 wrote to memory of 1736 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2668 wrote to memory of 1736 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2668 wrote to memory of 1736 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 3344 wrote to memory of 1020 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 3344 wrote to memory of 1020 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 3344 wrote to memory of 1020 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 384 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 384 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 384 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 384 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 384 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 384 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 384 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 384 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 384 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 384 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 384 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 384 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 384 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 384 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 384 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 384 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 384 wrote to memory of 4424 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 384 wrote to memory of 3172 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
PID 384 wrote to memory of 3172 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
PID 384 wrote to memory of 3172 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 3172 wrote to memory of 4504 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe" +s +h

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe" +s +h

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4424 -ip 4424

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 416

C:\Windows\SysWOW64\MSDCSC\msdcsc.exe

"C:\Windows\system32\MSDCSC\msdcsc.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4504 -ip 4504

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 184

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 romanticboy.zapto.org udp
BE 88.221.83.187:443 www.bing.com tcp
US 8.8.8.8:53 187.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 21.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp
US 8.8.8.8:53 romanticboy.zapto.org udp

Files

memory/384-0-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/384-1-0x0000000002200000-0x0000000002201000-memory.dmp

memory/4424-5-0x0000000000510000-0x0000000000511000-memory.dmp

C:\Windows\SysWOW64\MSDCSC\msdcsc.exe

MD5 1df9fece0dd4500c39dbe9544959a9b7
SHA1 5e3a78348a7c8227324e7c586c9f1705d9f1e042
SHA256 803c89efe08eb9dd7dc35bd886818e61ffa82762d75f63c9d2691dd66e703524
SHA512 0bce0589f10d9c76db128dd74d284fe9708f43099dd7a2827f108a82ac5116f906e4f5fb4c0892f9f00f9aa856dd6b478e9ffc7849e7a25b696aafcf9ca8a9a6

memory/3172-64-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/4504-66-0x0000000000BA0000-0x0000000000BA1000-memory.dmp

memory/384-68-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/3172-70-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/3172-71-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/3172-72-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/3172-73-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/3172-74-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/3172-75-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/3172-76-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/3172-77-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/3172-78-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/3172-79-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/3172-80-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/3172-81-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/3172-82-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/3172-83-0x0000000000400000-0x00000000004EE000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-02 04:18

Reported

2024-07-02 04:21

Platform

win7-20240611-en

Max time kernel

150s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

LatentBot

trojan latentbot

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\MSDCSC\ C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2092 wrote to memory of 2928 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2092 wrote to memory of 2928 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2092 wrote to memory of 2928 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2092 wrote to memory of 2928 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2092 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2092 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2092 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2092 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2180 wrote to memory of 2060 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2180 wrote to memory of 2060 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2180 wrote to memory of 2060 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2180 wrote to memory of 2060 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2928 wrote to memory of 2136 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2928 wrote to memory of 2136 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2928 wrote to memory of 2136 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2928 wrote to memory of 2136 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2092 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\notepad.exe
PID 2392 wrote to memory of 2804 N/A C:\Windows\SysWOW64\notepad.exe C:\Windows\SysWOW64\WerFault.exe
PID 2392 wrote to memory of 2804 N/A C:\Windows\SysWOW64\notepad.exe C:\Windows\SysWOW64\WerFault.exe
PID 2392 wrote to memory of 2804 N/A C:\Windows\SysWOW64\notepad.exe C:\Windows\SysWOW64\WerFault.exe
PID 2392 wrote to memory of 2804 N/A C:\Windows\SysWOW64\notepad.exe C:\Windows\SysWOW64\WerFault.exe
PID 2092 wrote to memory of 2532 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
PID 2092 wrote to memory of 2532 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
PID 2092 wrote to memory of 2532 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
PID 2092 wrote to memory of 2532 N/A C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe
PID 2532 wrote to memory of 1708 N/A C:\Windows\SysWOW64\MSDCSC\msdcsc.exe C:\Windows\SysWOW64\notepad.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe" +s +h

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp\1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe" +s +h

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 264

C:\Windows\SysWOW64\MSDCSC\msdcsc.exe

"C:\Windows\system32\MSDCSC\msdcsc.exe"

C:\Windows\SysWOW64\notepad.exe

notepad

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 196

Network

Country Destination Domain Proto
US 8.8.8.8:53 romanticboy.zapto.org udp

Files

memory/2092-0-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/2092-1-0x0000000000520000-0x0000000000521000-memory.dmp

memory/2392-5-0x00000000000C0000-0x00000000000C1000-memory.dmp

memory/2392-33-0x00000000001B0000-0x00000000001B1000-memory.dmp

\Windows\SysWOW64\MSDCSC\msdcsc.exe

MD5 1df9fece0dd4500c39dbe9544959a9b7
SHA1 5e3a78348a7c8227324e7c586c9f1705d9f1e042
SHA256 803c89efe08eb9dd7dc35bd886818e61ffa82762d75f63c9d2691dd66e703524
SHA512 0bce0589f10d9c76db128dd74d284fe9708f43099dd7a2827f108a82ac5116f906e4f5fb4c0892f9f00f9aa856dd6b478e9ffc7849e7a25b696aafcf9ca8a9a6

memory/2092-41-0x0000000004760000-0x000000000484E000-memory.dmp

memory/2532-43-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/2092-85-0x0000000000400000-0x00000000004EE000-memory.dmp

memory/2532-88-0x0000000000400000-0x00000000004EE000-memory.dmp