Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 13:04
Static task
static1
Behavioral task
behavioral1
Sample
1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe
-
Size
748KB
-
MD5
1f68ac4cea5976b8c89dbb2a6a16bf75
-
SHA1
506d7d46319a116e7106c1379423d9ce16b854f9
-
SHA256
9eea21de124f6cca492e675bd88c96edbc0685d772221d8d0b88dbb1967072f3
-
SHA512
cfd134a813aee19a8cc63127a232d09d1beff9f5fcf56a73f3df7b3ba0fb6c2e11d9c37b2e80dd2e7ebb19753d09b7fe7c22f684c6c0eed67369a35e3d7bea1c
-
SSDEEP
12288:dEogJC6YLIWhNdOPzUoHT3pM/hjX3iFGkBpgHSheFlfkYJvh5OznUNv0JuSajV4:dEogIkWhNdO1HT3pMZFkBplMXfk0vhW5
Malware Config
Extracted
darkcomet
Guest16
darkcomet2013.no-ip.biz:1500
192.168.1.71:1500
DC_MUTEX-EL0EZ2Q
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
avRlhtZvzGeQ
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 9 IoCs
Processes:
msdcsc.exemsdcsc.exe1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe -
Sets file to hidden 1 TTPs 18 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 1780 attrib.exe 2160 attrib.exe 2848 attrib.exe 2504 attrib.exe 1724 attrib.exe 2716 attrib.exe 2340 attrib.exe 1940 attrib.exe 2864 attrib.exe 2476 attrib.exe 1960 attrib.exe 2672 attrib.exe 1940 attrib.exe 2936 attrib.exe 2960 attrib.exe 3044 attrib.exe 2876 attrib.exe 2824 attrib.exe -
Deletes itself 1 IoCs
Processes:
notepad.exepid process 3028 notepad.exe -
Executes dropped EXE 16 IoCs
Processes:
msdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exepid process 2752 msdcsc.exe 2188 msdcsc.exe 1128 msdcsc.exe 2592 msdcsc.exe 536 msdcsc.exe 588 msdcsc.exe 1952 msdcsc.exe 1240 msdcsc.exe 2700 msdcsc.exe 2744 msdcsc.exe 2656 msdcsc.exe 1292 msdcsc.exe 380 msdcsc.exe 768 msdcsc.exe 904 msdcsc.exe 2896 msdcsc.exe -
Loads dropped DLL 17 IoCs
Processes:
1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exepid process 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 2752 msdcsc.exe 2188 msdcsc.exe 2188 msdcsc.exe 2592 msdcsc.exe 2592 msdcsc.exe 588 msdcsc.exe 588 msdcsc.exe 1240 msdcsc.exe 1240 msdcsc.exe 2744 msdcsc.exe 2744 msdcsc.exe 1292 msdcsc.exe 1292 msdcsc.exe 768 msdcsc.exe 768 msdcsc.exe -
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe -
Drops file in System32 directory 53 IoCs
Processes:
msdcsc.exeattrib.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exeattrib.exe1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exeattrib.exeattrib.exemsdcsc.exeattrib.exeattrib.exemsdcsc.exeattrib.exeattrib.exemsdcsc.exemsdcsc.exemsdcsc.exeattrib.exemsdcsc.exeattrib.exemsdcsc.exeattrib.exeattrib.exemsdcsc.exemsdcsc.exeattrib.exemsdcsc.exeattrib.exeattrib.exemsdcsc.exemsdcsc.exeattrib.exedescription ioc process File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ attrib.exe File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ attrib.exe File created C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\ msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC attrib.exe File created C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ attrib.exe File created C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe attrib.exe -
Suspicious use of SetThreadContext 9 IoCs
Processes:
1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exedescription pid process target process PID 1280 set thread context of 2112 1280 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 2752 set thread context of 2188 2752 msdcsc.exe msdcsc.exe PID 1128 set thread context of 2592 1128 msdcsc.exe msdcsc.exe PID 536 set thread context of 588 536 msdcsc.exe msdcsc.exe PID 1952 set thread context of 1240 1952 msdcsc.exe msdcsc.exe PID 2700 set thread context of 2744 2700 msdcsc.exe msdcsc.exe PID 2656 set thread context of 1292 2656 msdcsc.exe msdcsc.exe PID 380 set thread context of 768 380 msdcsc.exe msdcsc.exe PID 904 set thread context of 2896 904 msdcsc.exe msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exemsdcsc.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeSecurityPrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeSystemtimePrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeBackupPrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeRestorePrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeShutdownPrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeDebugPrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeUndockPrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeManageVolumePrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeImpersonatePrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: 33 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: 34 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: 35 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2188 msdcsc.exe Token: SeSecurityPrivilege 2188 msdcsc.exe Token: SeTakeOwnershipPrivilege 2188 msdcsc.exe Token: SeLoadDriverPrivilege 2188 msdcsc.exe Token: SeSystemProfilePrivilege 2188 msdcsc.exe Token: SeSystemtimePrivilege 2188 msdcsc.exe Token: SeProfSingleProcessPrivilege 2188 msdcsc.exe Token: SeIncBasePriorityPrivilege 2188 msdcsc.exe Token: SeCreatePagefilePrivilege 2188 msdcsc.exe Token: SeBackupPrivilege 2188 msdcsc.exe Token: SeRestorePrivilege 2188 msdcsc.exe Token: SeShutdownPrivilege 2188 msdcsc.exe Token: SeDebugPrivilege 2188 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2188 msdcsc.exe Token: SeChangeNotifyPrivilege 2188 msdcsc.exe Token: SeRemoteShutdownPrivilege 2188 msdcsc.exe Token: SeUndockPrivilege 2188 msdcsc.exe Token: SeManageVolumePrivilege 2188 msdcsc.exe Token: SeImpersonatePrivilege 2188 msdcsc.exe Token: SeCreateGlobalPrivilege 2188 msdcsc.exe Token: 33 2188 msdcsc.exe Token: 34 2188 msdcsc.exe Token: 35 2188 msdcsc.exe Token: SeIncreaseQuotaPrivilege 2592 msdcsc.exe Token: SeSecurityPrivilege 2592 msdcsc.exe Token: SeTakeOwnershipPrivilege 2592 msdcsc.exe Token: SeLoadDriverPrivilege 2592 msdcsc.exe Token: SeSystemProfilePrivilege 2592 msdcsc.exe Token: SeSystemtimePrivilege 2592 msdcsc.exe Token: SeProfSingleProcessPrivilege 2592 msdcsc.exe Token: SeIncBasePriorityPrivilege 2592 msdcsc.exe Token: SeCreatePagefilePrivilege 2592 msdcsc.exe Token: SeBackupPrivilege 2592 msdcsc.exe Token: SeRestorePrivilege 2592 msdcsc.exe Token: SeShutdownPrivilege 2592 msdcsc.exe Token: SeDebugPrivilege 2592 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2592 msdcsc.exe Token: SeChangeNotifyPrivilege 2592 msdcsc.exe Token: SeRemoteShutdownPrivilege 2592 msdcsc.exe Token: SeUndockPrivilege 2592 msdcsc.exe Token: SeManageVolumePrivilege 2592 msdcsc.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exepid process 1280 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 2752 msdcsc.exe 1128 msdcsc.exe 536 msdcsc.exe 1952 msdcsc.exe 2700 msdcsc.exe 2656 msdcsc.exe 380 msdcsc.exe 904 msdcsc.exe 2436 msdcsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.execmd.execmd.exemsdcsc.exedescription pid process target process PID 1280 wrote to memory of 2112 1280 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 1280 wrote to memory of 2112 1280 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 1280 wrote to memory of 2112 1280 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 1280 wrote to memory of 2112 1280 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 1280 wrote to memory of 2112 1280 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 1280 wrote to memory of 2112 1280 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 1280 wrote to memory of 2112 1280 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 1280 wrote to memory of 2112 1280 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 1280 wrote to memory of 2112 1280 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 1280 wrote to memory of 2112 1280 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 1280 wrote to memory of 2112 1280 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 1280 wrote to memory of 2112 1280 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 1280 wrote to memory of 2112 1280 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 1280 wrote to memory of 2112 1280 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 1280 wrote to memory of 2112 1280 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 2112 wrote to memory of 3032 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe cmd.exe PID 2112 wrote to memory of 3032 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe cmd.exe PID 2112 wrote to memory of 3032 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe cmd.exe PID 2112 wrote to memory of 3032 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe cmd.exe PID 2112 wrote to memory of 2080 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe cmd.exe PID 2112 wrote to memory of 2080 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe cmd.exe PID 2112 wrote to memory of 2080 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe cmd.exe PID 2112 wrote to memory of 2080 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe cmd.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 2112 wrote to memory of 3028 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 3032 wrote to memory of 2848 3032 cmd.exe attrib.exe PID 3032 wrote to memory of 2848 3032 cmd.exe attrib.exe PID 3032 wrote to memory of 2848 3032 cmd.exe attrib.exe PID 3032 wrote to memory of 2848 3032 cmd.exe attrib.exe PID 2080 wrote to memory of 2504 2080 cmd.exe attrib.exe PID 2080 wrote to memory of 2504 2080 cmd.exe attrib.exe PID 2080 wrote to memory of 2504 2080 cmd.exe attrib.exe PID 2080 wrote to memory of 2504 2080 cmd.exe attrib.exe PID 2112 wrote to memory of 2752 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe conhost.exe PID 2112 wrote to memory of 2752 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe conhost.exe PID 2112 wrote to memory of 2752 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe conhost.exe PID 2112 wrote to memory of 2752 2112 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe conhost.exe PID 2752 wrote to memory of 2188 2752 msdcsc.exe msdcsc.exe PID 2752 wrote to memory of 2188 2752 msdcsc.exe msdcsc.exe PID 2752 wrote to memory of 2188 2752 msdcsc.exe msdcsc.exe PID 2752 wrote to memory of 2188 2752 msdcsc.exe msdcsc.exe PID 2752 wrote to memory of 2188 2752 msdcsc.exe msdcsc.exe PID 2752 wrote to memory of 2188 2752 msdcsc.exe msdcsc.exe PID 2752 wrote to memory of 2188 2752 msdcsc.exe msdcsc.exe PID 2752 wrote to memory of 2188 2752 msdcsc.exe msdcsc.exe PID 2752 wrote to memory of 2188 2752 msdcsc.exe msdcsc.exe PID 2752 wrote to memory of 2188 2752 msdcsc.exe msdcsc.exe PID 2752 wrote to memory of 2188 2752 msdcsc.exe msdcsc.exe -
Views/modifies file attributes 1 TTPs 18 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 2340 attrib.exe 2504 attrib.exe 2824 attrib.exe 2864 attrib.exe 2160 attrib.exe 1724 attrib.exe 2716 attrib.exe 3044 attrib.exe 2960 attrib.exe 1780 attrib.exe 2476 attrib.exe 2876 attrib.exe 1940 attrib.exe 1960 attrib.exe 2672 attrib.exe 1940 attrib.exe 2848 attrib.exe 2936 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
- Deletes itself
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\msdcsc.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h5⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h6⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h5⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC" +s +h6⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad5⤵
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe"C:\Windows\system32\MSDCSC\avRlhtZvzGeQ\msdcsc.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe6⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe" +s +h7⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe" +s +h8⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ" +s +h7⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ" +s +h8⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad7⤵
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe"C:\Windows\system32\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe8⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe" +s +h9⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe" +s +h10⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ" +s +h9⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ" +s +h10⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad9⤵
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe"C:\Windows\system32\MSDCSC\avRlhtZvzGeQ\msdcsc.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe10⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe" +s +h11⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe" +s +h12⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ" +s +h11⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ" +s +h12⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad11⤵
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe"C:\Windows\system32\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe12⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe" +s +h13⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe" +s +h14⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ" +s +h13⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ" +s +h14⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad13⤵
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe"C:\Windows\system32\MSDCSC\avRlhtZvzGeQ\msdcsc.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe14⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe" +s +h15⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe" +s +h16⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ" +s +h15⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ" +s +h16⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad15⤵
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe"C:\Windows\system32\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe16⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe" +s +h17⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe" +s +h18⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ" +s +h17⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ" +s +h18⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad17⤵
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe"C:\Windows\system32\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe18⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe" +s +h19⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe" +s +h20⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ" +s +h19⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ" +s +h20⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad19⤵
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe"C:\Windows\system32\MSDCSC\avRlhtZvzGeQ\msdcsc.exe"19⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-2095331053-240096758-1543742754496004497-21902033243837759-1178681543-822739089"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Windows\SysWOW64\MSDCSC\msdcsc.exeFilesize
748KB
MD51f68ac4cea5976b8c89dbb2a6a16bf75
SHA1506d7d46319a116e7106c1379423d9ce16b854f9
SHA2569eea21de124f6cca492e675bd88c96edbc0685d772221d8d0b88dbb1967072f3
SHA512cfd134a813aee19a8cc63127a232d09d1beff9f5fcf56a73f3df7b3ba0fb6c2e11d9c37b2e80dd2e7ebb19753d09b7fe7c22f684c6c0eed67369a35e3d7bea1c
-
memory/2112-2-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/2112-3-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/2112-4-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/2112-5-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/2112-6-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/2112-38-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/2188-83-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/2592-91-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/3028-10-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/3028-24-0x0000000000150000-0x0000000000151000-memory.dmpFilesize
4KB