Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2024 13:04
Static task
static1
Behavioral task
behavioral1
Sample
1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe
-
Size
748KB
-
MD5
1f68ac4cea5976b8c89dbb2a6a16bf75
-
SHA1
506d7d46319a116e7106c1379423d9ce16b854f9
-
SHA256
9eea21de124f6cca492e675bd88c96edbc0685d772221d8d0b88dbb1967072f3
-
SHA512
cfd134a813aee19a8cc63127a232d09d1beff9f5fcf56a73f3df7b3ba0fb6c2e11d9c37b2e80dd2e7ebb19753d09b7fe7c22f684c6c0eed67369a35e3d7bea1c
-
SSDEEP
12288:dEogJC6YLIWhNdOPzUoHT3pM/hjX3iFGkBpgHSheFlfkYJvh5OznUNv0JuSajV4:dEogIkWhNdO1HT3pMZFkBplMXfk0vhW5
Malware Config
Extracted
darkcomet
Guest16
darkcomet2013.no-ip.biz:1500
192.168.1.71:1500
DC_MUTEX-EL0EZ2Q
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
avRlhtZvzGeQ
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 10 IoCs
Processes:
msdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exe1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exemsdcsc.exemsdcsc.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe,C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
msdcsc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
msdcsc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msdcsc.exe -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 20 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 4080 attrib.exe 1380 attrib.exe 3208 attrib.exe 1364 attrib.exe 4648 attrib.exe 1740 attrib.exe 2624 attrib.exe 1148 attrib.exe 1064 attrib.exe 4512 attrib.exe 2176 attrib.exe 1140 attrib.exe 2032 attrib.exe 4316 attrib.exe 5076 attrib.exe 1740 attrib.exe 3036 attrib.exe 3908 attrib.exe 4408 attrib.exe 5016 attrib.exe -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
msdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exe1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exemsdcsc.exemsdcsc.exemsdcsc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation msdcsc.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation msdcsc.exe -
Deletes itself 1 IoCs
Processes:
notepad.exepid process 3144 notepad.exe -
Executes dropped EXE 18 IoCs
Processes:
msdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exepid process 2276 msdcsc.exe 3964 msdcsc.exe 2084 msdcsc.exe 596 msdcsc.exe 4056 msdcsc.exe 2096 msdcsc.exe 4144 msdcsc.exe 4620 msdcsc.exe 4124 msdcsc.exe 748 msdcsc.exe 2264 msdcsc.exe 2308 msdcsc.exe 3512 msdcsc.exe 3940 msdcsc.exe 1768 msdcsc.exe 5056 msdcsc.exe 4180 msdcsc.exe 1464 msdcsc.exe -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 10 IoCs
Processes:
msdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exe1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\avRlhtZvzGeQ\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Drops file in System32 directory 62 IoCs
Processes:
msdcsc.exeattrib.exemsdcsc.exemsdcsc.exemsdcsc.exeattrib.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exeattrib.exeattrib.exemsdcsc.exemsdcsc.exemsdcsc.exe1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exemsdcsc.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exemsdcsc.exeattrib.exemsdcsc.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exemsdcsc.exemsdcsc.exemsdcsc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe attrib.exe File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\ msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\ msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC attrib.exe File created C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC attrib.exe File created C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\ msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\ msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\ 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File opened for modification C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe msdcsc.exe File created C:\Windows\SysWOW64\MSDCSC\msdcsc.exe msdcsc.exe -
Suspicious use of SetThreadContext 10 IoCs
Processes:
1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exedescription pid process target process PID 764 set thread context of 700 764 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 2276 set thread context of 3964 2276 msdcsc.exe msdcsc.exe PID 2084 set thread context of 596 2084 msdcsc.exe msdcsc.exe PID 4056 set thread context of 2096 4056 msdcsc.exe msdcsc.exe PID 4144 set thread context of 4620 4144 msdcsc.exe msdcsc.exe PID 4124 set thread context of 748 4124 msdcsc.exe msdcsc.exe PID 2264 set thread context of 2308 2264 msdcsc.exe msdcsc.exe PID 3512 set thread context of 3940 3512 msdcsc.exe msdcsc.exe PID 1768 set thread context of 5056 1768 msdcsc.exe msdcsc.exe PID 4180 set thread context of 1464 4180 msdcsc.exe msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
msdcsc.exemsdcsc.exemsdcsc.exe1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exemsdcsc.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeSecurityPrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeLoadDriverPrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeSystemProfilePrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeSystemtimePrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeBackupPrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeRestorePrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeShutdownPrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeDebugPrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeUndockPrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeManageVolumePrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeImpersonatePrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: 33 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: 34 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: 35 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: 36 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 3964 msdcsc.exe Token: SeSecurityPrivilege 3964 msdcsc.exe Token: SeTakeOwnershipPrivilege 3964 msdcsc.exe Token: SeLoadDriverPrivilege 3964 msdcsc.exe Token: SeSystemProfilePrivilege 3964 msdcsc.exe Token: SeSystemtimePrivilege 3964 msdcsc.exe Token: SeProfSingleProcessPrivilege 3964 msdcsc.exe Token: SeIncBasePriorityPrivilege 3964 msdcsc.exe Token: SeCreatePagefilePrivilege 3964 msdcsc.exe Token: SeBackupPrivilege 3964 msdcsc.exe Token: SeRestorePrivilege 3964 msdcsc.exe Token: SeShutdownPrivilege 3964 msdcsc.exe Token: SeDebugPrivilege 3964 msdcsc.exe Token: SeSystemEnvironmentPrivilege 3964 msdcsc.exe Token: SeChangeNotifyPrivilege 3964 msdcsc.exe Token: SeRemoteShutdownPrivilege 3964 msdcsc.exe Token: SeUndockPrivilege 3964 msdcsc.exe Token: SeManageVolumePrivilege 3964 msdcsc.exe Token: SeImpersonatePrivilege 3964 msdcsc.exe Token: SeCreateGlobalPrivilege 3964 msdcsc.exe Token: 33 3964 msdcsc.exe Token: 34 3964 msdcsc.exe Token: 35 3964 msdcsc.exe Token: 36 3964 msdcsc.exe Token: SeIncreaseQuotaPrivilege 596 msdcsc.exe Token: SeSecurityPrivilege 596 msdcsc.exe Token: SeTakeOwnershipPrivilege 596 msdcsc.exe Token: SeLoadDriverPrivilege 596 msdcsc.exe Token: SeSystemProfilePrivilege 596 msdcsc.exe Token: SeSystemtimePrivilege 596 msdcsc.exe Token: SeProfSingleProcessPrivilege 596 msdcsc.exe Token: SeIncBasePriorityPrivilege 596 msdcsc.exe Token: SeCreatePagefilePrivilege 596 msdcsc.exe Token: SeBackupPrivilege 596 msdcsc.exe Token: SeRestorePrivilege 596 msdcsc.exe Token: SeShutdownPrivilege 596 msdcsc.exe Token: SeDebugPrivilege 596 msdcsc.exe Token: SeSystemEnvironmentPrivilege 596 msdcsc.exe Token: SeChangeNotifyPrivilege 596 msdcsc.exe Token: SeRemoteShutdownPrivilege 596 msdcsc.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exemsdcsc.exepid process 764 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 2276 msdcsc.exe 2084 msdcsc.exe 4056 msdcsc.exe 4144 msdcsc.exe 4124 msdcsc.exe 2264 msdcsc.exe 3512 msdcsc.exe 1768 msdcsc.exe 4180 msdcsc.exe 1464 msdcsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.execmd.execmd.exemsdcsc.exemsdcsc.exedescription pid process target process PID 764 wrote to memory of 700 764 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 764 wrote to memory of 700 764 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 764 wrote to memory of 700 764 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 764 wrote to memory of 700 764 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 764 wrote to memory of 700 764 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 764 wrote to memory of 700 764 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 764 wrote to memory of 700 764 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 764 wrote to memory of 700 764 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 764 wrote to memory of 700 764 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 764 wrote to memory of 700 764 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 764 wrote to memory of 700 764 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 764 wrote to memory of 700 764 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 764 wrote to memory of 700 764 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 764 wrote to memory of 700 764 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe PID 700 wrote to memory of 5024 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe cmd.exe PID 700 wrote to memory of 5024 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe cmd.exe PID 700 wrote to memory of 5024 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe cmd.exe PID 700 wrote to memory of 2444 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe cmd.exe PID 700 wrote to memory of 2444 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe cmd.exe PID 700 wrote to memory of 2444 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe cmd.exe PID 700 wrote to memory of 3144 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 700 wrote to memory of 3144 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 700 wrote to memory of 3144 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 700 wrote to memory of 3144 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 700 wrote to memory of 3144 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 700 wrote to memory of 3144 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 700 wrote to memory of 3144 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 700 wrote to memory of 3144 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 700 wrote to memory of 3144 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 700 wrote to memory of 3144 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 700 wrote to memory of 3144 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 700 wrote to memory of 3144 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 700 wrote to memory of 3144 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 700 wrote to memory of 3144 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 700 wrote to memory of 3144 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 700 wrote to memory of 3144 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 700 wrote to memory of 3144 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe notepad.exe PID 5024 wrote to memory of 5076 5024 cmd.exe attrib.exe PID 5024 wrote to memory of 5076 5024 cmd.exe attrib.exe PID 5024 wrote to memory of 5076 5024 cmd.exe attrib.exe PID 2444 wrote to memory of 1148 2444 cmd.exe attrib.exe PID 2444 wrote to memory of 1148 2444 cmd.exe attrib.exe PID 2444 wrote to memory of 1148 2444 cmd.exe attrib.exe PID 700 wrote to memory of 2276 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe msdcsc.exe PID 700 wrote to memory of 2276 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe msdcsc.exe PID 700 wrote to memory of 2276 700 1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe msdcsc.exe PID 2276 wrote to memory of 3964 2276 msdcsc.exe msdcsc.exe PID 2276 wrote to memory of 3964 2276 msdcsc.exe msdcsc.exe PID 2276 wrote to memory of 3964 2276 msdcsc.exe msdcsc.exe PID 2276 wrote to memory of 3964 2276 msdcsc.exe msdcsc.exe PID 2276 wrote to memory of 3964 2276 msdcsc.exe msdcsc.exe PID 2276 wrote to memory of 3964 2276 msdcsc.exe msdcsc.exe PID 2276 wrote to memory of 3964 2276 msdcsc.exe msdcsc.exe PID 2276 wrote to memory of 3964 2276 msdcsc.exe msdcsc.exe PID 2276 wrote to memory of 3964 2276 msdcsc.exe msdcsc.exe PID 2276 wrote to memory of 3964 2276 msdcsc.exe msdcsc.exe PID 2276 wrote to memory of 3964 2276 msdcsc.exe msdcsc.exe PID 2276 wrote to memory of 3964 2276 msdcsc.exe msdcsc.exe PID 2276 wrote to memory of 3964 2276 msdcsc.exe msdcsc.exe PID 2276 wrote to memory of 3964 2276 msdcsc.exe msdcsc.exe PID 3964 wrote to memory of 1088 3964 msdcsc.exe cmd.exe PID 3964 wrote to memory of 1088 3964 msdcsc.exe cmd.exe PID 3964 wrote to memory of 1088 3964 msdcsc.exe cmd.exe PID 3964 wrote to memory of 4912 3964 msdcsc.exe cmd.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
msdcsc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe -
Views/modifies file attributes 1 TTPs 20 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 1740 attrib.exe 2032 attrib.exe 3908 attrib.exe 4316 attrib.exe 4080 attrib.exe 1380 attrib.exe 3036 attrib.exe 4512 attrib.exe 2176 attrib.exe 1140 attrib.exe 1364 attrib.exe 4648 attrib.exe 1064 attrib.exe 1740 attrib.exe 3208 attrib.exe 2624 attrib.exe 4408 attrib.exe 5016 attrib.exe 5076 attrib.exe 1148 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\1f68ac4cea5976b8c89dbb2a6a16bf75_JaffaCakes118.exe" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad3⤵
- Deletes itself
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\msdcsc.exe4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h5⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h6⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h5⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC" +s +h6⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad5⤵
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe"C:\Windows\system32\MSDCSC\avRlhtZvzGeQ\msdcsc.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe6⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe" +s +h7⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe" +s +h8⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ" +s +h7⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ" +s +h8⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad7⤵
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe"C:\Windows\system32\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe8⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe" +s +h9⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe" +s +h10⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ" +s +h9⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ" +s +h10⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad9⤵
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\msdcsc.exe10⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h11⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h12⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h11⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC" +s +h12⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad11⤵
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe"C:\Windows\system32\MSDCSC\avRlhtZvzGeQ\msdcsc.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe12⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe" +s +h13⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe" +s +h14⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ" +s +h13⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ" +s +h14⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad13⤵
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe"C:\Windows\system32\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe14⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe" +s +h15⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe" +s +h16⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ" +s +h15⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ" +s +h16⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad15⤵
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"C:\Windows\system32\MSDCSC\msdcsc.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\msdcsc.exe16⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h17⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV118⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h18⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h17⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC" +s +h18⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad17⤵
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe"C:\Windows\system32\MSDCSC\avRlhtZvzGeQ\msdcsc.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe18⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe" +s +h19⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\msdcsc.exe" +s +h20⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ" +s +h19⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ" +s +h20⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad19⤵
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe"C:\Windows\system32\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exeC:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe20⤵
- Modifies WinLogon for persistence
- Modifies security service
- Windows security bypass
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- System policy modification
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe" +s +h21⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ\msdcsc.exe" +s +h22⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ" +s +h21⤵
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\MSDCSC\avRlhtZvzGeQ\avRlhtZvzGeQ" +s +h22⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\notepad.exenotepad21⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\MSDCSC\msdcsc.exeFilesize
748KB
MD51f68ac4cea5976b8c89dbb2a6a16bf75
SHA1506d7d46319a116e7106c1379423d9ce16b854f9
SHA2569eea21de124f6cca492e675bd88c96edbc0685d772221d8d0b88dbb1967072f3
SHA512cfd134a813aee19a8cc63127a232d09d1beff9f5fcf56a73f3df7b3ba0fb6c2e11d9c37b2e80dd2e7ebb19753d09b7fe7c22f684c6c0eed67369a35e3d7bea1c
-
memory/596-208-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/700-5-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/700-9-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/700-4-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/700-68-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/700-3-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/700-2-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/748-417-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/1464-645-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/1464-643-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/1464-644-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/1464-641-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/1464-647-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/2096-278-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/2308-488-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/2308-425-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/3144-10-0x0000000000FD0000-0x0000000000FD1000-memory.dmpFilesize
4KB
-
memory/3940-495-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/3940-558-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/3964-137-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/3964-75-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/4620-348-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/5056-627-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/5092-642-0x00000000004E0000-0x00000000004E1000-memory.dmpFilesize
4KB