Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 16:58

General

  • Target

    2597f68cbc765cab6df481cb363d2ab6_JaffaCakes118.exe

  • Size

    496KB

  • MD5

    2597f68cbc765cab6df481cb363d2ab6

  • SHA1

    883b67ce396816595a736c3cbf8dfc067e4aa243

  • SHA256

    e19dba28bb3f44d5e35b26ce8ae1959e8978abd36b2c0e8bb5a8e77d82de3aea

  • SHA512

    d8e84a00b1de0a13edf868b1e5cd1fe749f9d5667a0d16fe319f55a1f5b6925c233986043514479e600dfae6076b2b6dc75a789b59d530c8a5d264371fb24d27

  • SSDEEP

    12288:Zgsy44aTCjIsIQ7ZhKzMMg6dob/O5gxp6+0mPo:ZgstPmjGChKzMsobOaH6Ww

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 24 IoCs
  • Sets file to hidden 1 TTPs 48 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 24 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 23 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Drops file in System32 directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 24 IoCs
  • Runs ping.exe 1 TTPs 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2597f68cbc765cab6df481cb363d2ab6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2597f68cbc765cab6df481cb363d2ab6_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4436
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\2597f68cbc765cab6df481cb363d2ab6_JaffaCakes118.exe" +s +h
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4892
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp\2597f68cbc765cab6df481cb363d2ab6_JaffaCakes118.exe" +s +h
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:4504
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:636
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:3152
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Users\Admin\AppData\Local\Temp\2597f68cbc765cab6df481cb363d2ab6_JaffaCakes118.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:372
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 4
        3⤵
        • Runs ping.exe
        PID:3300
    • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
      "C:\Windows\system32\MSDCSC\msdcsc.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3496
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4692
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
          4⤵
          • Sets file to hidden
          • Drops file in System32 directory
          • Views/modifies file attributes
          PID:4072
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:336
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:3888
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4208
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 4
          4⤵
          • Runs ping.exe
          PID:2552
      • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
        "C:\Windows\system32\MSDCSC\msdcsc.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4576
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4600
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
            5⤵
            • Sets file to hidden
            • Drops file in System32 directory
            • Views/modifies file attributes
            PID:3148
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4888
          • C:\Windows\SysWOW64\attrib.exe
            attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
            5⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:3872
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1828
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 4
            5⤵
            • Runs ping.exe
            PID:4560
        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
          "C:\Windows\system32\MSDCSC\msdcsc.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3868
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
            5⤵
              PID:1516
              • C:\Windows\SysWOW64\attrib.exe
                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                6⤵
                • Sets file to hidden
                • Drops file in System32 directory
                • Views/modifies file attributes
                PID:4140
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
              5⤵
                PID:5096
                • C:\Windows\SysWOW64\attrib.exe
                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                  6⤵
                  • Sets file to hidden
                  • Views/modifies file attributes
                  PID:1488
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                5⤵
                  PID:2584
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1 -n 4
                    6⤵
                    • Runs ping.exe
                    PID:1484
                • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                  "C:\Windows\system32\MSDCSC\msdcsc.exe"
                  5⤵
                  • Modifies WinLogon for persistence
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Drops file in System32 directory
                  • Modifies registry class
                  PID:4432
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                    6⤵
                      PID:2472
                      • C:\Windows\SysWOW64\attrib.exe
                        attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                        7⤵
                        • Sets file to hidden
                        • Views/modifies file attributes
                        PID:2916
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                      6⤵
                        PID:3648
                        • C:\Windows\SysWOW64\attrib.exe
                          attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                          7⤵
                          • Sets file to hidden
                          • Views/modifies file attributes
                          PID:4340
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                        6⤵
                          PID:4856
                          • C:\Windows\SysWOW64\PING.EXE
                            ping 127.0.0.1 -n 4
                            7⤵
                            • Runs ping.exe
                            PID:4832
                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                          "C:\Windows\system32\MSDCSC\msdcsc.exe"
                          6⤵
                          • Modifies WinLogon for persistence
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Drops file in System32 directory
                          • Modifies registry class
                          PID:4912
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                            7⤵
                              PID:4376
                              • C:\Windows\SysWOW64\attrib.exe
                                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                8⤵
                                • Sets file to hidden
                                • Drops file in System32 directory
                                • Views/modifies file attributes
                                PID:4172
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                              7⤵
                                PID:4180
                                • C:\Windows\SysWOW64\attrib.exe
                                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                  8⤵
                                  • Sets file to hidden
                                  • Drops file in System32 directory
                                  • Views/modifies file attributes
                                  PID:4040
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                7⤵
                                  PID:4280
                                  • C:\Windows\SysWOW64\PING.EXE
                                    ping 127.0.0.1 -n 4
                                    8⤵
                                    • Runs ping.exe
                                    PID:4792
                                • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                  "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                  7⤵
                                  • Modifies WinLogon for persistence
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  PID:1484
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                    8⤵
                                      PID:1452
                                      • C:\Windows\SysWOW64\attrib.exe
                                        attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                        9⤵
                                        • Sets file to hidden
                                        • Views/modifies file attributes
                                        PID:4604
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                      8⤵
                                        PID:4340
                                        • C:\Windows\SysWOW64\attrib.exe
                                          attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                          9⤵
                                          • Sets file to hidden
                                          • Drops file in System32 directory
                                          • Views/modifies file attributes
                                          PID:4112
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                        8⤵
                                          PID:2900
                                          • C:\Windows\SysWOW64\PING.EXE
                                            ping 127.0.0.1 -n 4
                                            9⤵
                                            • Runs ping.exe
                                            PID:1572
                                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                          "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                          8⤵
                                          • Modifies WinLogon for persistence
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          • Drops file in System32 directory
                                          • Modifies registry class
                                          PID:2556
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                            9⤵
                                              PID:880
                                              • C:\Windows\SysWOW64\attrib.exe
                                                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                10⤵
                                                • Sets file to hidden
                                                • Drops file in System32 directory
                                                • Views/modifies file attributes
                                                PID:1732
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                              9⤵
                                                PID:3768
                                                • C:\Windows\SysWOW64\attrib.exe
                                                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                  10⤵
                                                  • Sets file to hidden
                                                  • Views/modifies file attributes
                                                  PID:4912
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                9⤵
                                                  PID:1932
                                                  • C:\Windows\SysWOW64\PING.EXE
                                                    ping 127.0.0.1 -n 4
                                                    10⤵
                                                    • Runs ping.exe
                                                    PID:2208
                                                • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                  "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                  9⤵
                                                  • Modifies WinLogon for persistence
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Adds Run key to start application
                                                  • Drops file in System32 directory
                                                  • Modifies registry class
                                                  PID:3144
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                    10⤵
                                                      PID:4232
                                                      • C:\Windows\SysWOW64\attrib.exe
                                                        attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                        11⤵
                                                        • Sets file to hidden
                                                        • Drops file in System32 directory
                                                        • Views/modifies file attributes
                                                        PID:2940
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                      10⤵
                                                        PID:4380
                                                        • C:\Windows\SysWOW64\attrib.exe
                                                          attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                          11⤵
                                                          • Sets file to hidden
                                                          • Views/modifies file attributes
                                                          PID:4144
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                        10⤵
                                                          PID:4112
                                                          • C:\Windows\SysWOW64\PING.EXE
                                                            ping 127.0.0.1 -n 4
                                                            11⤵
                                                            • Runs ping.exe
                                                            PID:3412
                                                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                          "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                          10⤵
                                                          • Modifies WinLogon for persistence
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Drops file in System32 directory
                                                          • Modifies registry class
                                                          PID:1664
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                            11⤵
                                                              PID:2208
                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                12⤵
                                                                • Sets file to hidden
                                                                • Drops file in System32 directory
                                                                • Views/modifies file attributes
                                                                PID:4084
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                              11⤵
                                                                PID:3240
                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                  12⤵
                                                                  • Sets file to hidden
                                                                  • Views/modifies file attributes
                                                                  PID:3848
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                11⤵
                                                                  PID:1588
                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                    ping 127.0.0.1 -n 4
                                                                    12⤵
                                                                    • Runs ping.exe
                                                                    PID:2628
                                                                • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                  "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                  11⤵
                                                                  • Modifies WinLogon for persistence
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • Adds Run key to start application
                                                                  • Drops file in System32 directory
                                                                  • Modifies registry class
                                                                  PID:4972
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                    12⤵
                                                                      PID:4348
                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                        13⤵
                                                                        • Sets file to hidden
                                                                        • Views/modifies file attributes
                                                                        PID:2628
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                      12⤵
                                                                        PID:4656
                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                          attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                          13⤵
                                                                          • Sets file to hidden
                                                                          • Drops file in System32 directory
                                                                          • Views/modifies file attributes
                                                                          PID:3332
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                        12⤵
                                                                          PID:4616
                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                            ping 127.0.0.1 -n 4
                                                                            13⤵
                                                                            • Runs ping.exe
                                                                            PID:3496
                                                                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                          "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                          12⤵
                                                                          • Modifies WinLogon for persistence
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Adds Run key to start application
                                                                          • Drops file in System32 directory
                                                                          • Modifies registry class
                                                                          PID:2556
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                            13⤵
                                                                              PID:4028
                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                14⤵
                                                                                • Sets file to hidden
                                                                                • Drops file in System32 directory
                                                                                • Views/modifies file attributes
                                                                                PID:3524
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                              13⤵
                                                                                PID:1328
                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                  14⤵
                                                                                  • Sets file to hidden
                                                                                  • Drops file in System32 directory
                                                                                  • Views/modifies file attributes
                                                                                  PID:428
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                13⤵
                                                                                  PID:4272
                                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                                    ping 127.0.0.1 -n 4
                                                                                    14⤵
                                                                                    • Runs ping.exe
                                                                                    PID:1836
                                                                                • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                  "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                  13⤵
                                                                                  • Modifies WinLogon for persistence
                                                                                  • Checks computer location settings
                                                                                  • Executes dropped EXE
                                                                                  • Adds Run key to start application
                                                                                  • Drops file in System32 directory
                                                                                  • Modifies registry class
                                                                                  PID:1984
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                    14⤵
                                                                                      PID:2412
                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                        15⤵
                                                                                        • Sets file to hidden
                                                                                        • Views/modifies file attributes
                                                                                        PID:1836
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                      14⤵
                                                                                        PID:3524
                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                          15⤵
                                                                                          • Sets file to hidden
                                                                                          • Views/modifies file attributes
                                                                                          PID:2660
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                        14⤵
                                                                                          PID:720
                                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                                            ping 127.0.0.1 -n 4
                                                                                            15⤵
                                                                                            • Runs ping.exe
                                                                                            PID:652
                                                                                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                          "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                          14⤵
                                                                                          • Modifies WinLogon for persistence
                                                                                          • Checks computer location settings
                                                                                          • Executes dropped EXE
                                                                                          • Adds Run key to start application
                                                                                          • Drops file in System32 directory
                                                                                          • Modifies registry class
                                                                                          PID:3628
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                            15⤵
                                                                                              PID:3864
                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                16⤵
                                                                                                • Sets file to hidden
                                                                                                • Drops file in System32 directory
                                                                                                • Views/modifies file attributes
                                                                                                PID:388
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                              15⤵
                                                                                                PID:4768
                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                  16⤵
                                                                                                  • Sets file to hidden
                                                                                                  • Drops file in System32 directory
                                                                                                  • Views/modifies file attributes
                                                                                                  PID:1572
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                15⤵
                                                                                                  PID:3152
                                                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                                                    ping 127.0.0.1 -n 4
                                                                                                    16⤵
                                                                                                    • Runs ping.exe
                                                                                                    PID:1880
                                                                                                • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                  "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                  15⤵
                                                                                                  • Modifies WinLogon for persistence
                                                                                                  • Checks computer location settings
                                                                                                  • Executes dropped EXE
                                                                                                  • Adds Run key to start application
                                                                                                  • Drops file in System32 directory
                                                                                                  • Modifies registry class
                                                                                                  PID:4868
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                    16⤵
                                                                                                      PID:4580
                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                        17⤵
                                                                                                        • Sets file to hidden
                                                                                                        • Drops file in System32 directory
                                                                                                        • Views/modifies file attributes
                                                                                                        PID:1644
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                      16⤵
                                                                                                        PID:1392
                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                          17⤵
                                                                                                          • Sets file to hidden
                                                                                                          • Drops file in System32 directory
                                                                                                          • Views/modifies file attributes
                                                                                                          PID:1880
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                        16⤵
                                                                                                          PID:2192
                                                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                                                            ping 127.0.0.1 -n 4
                                                                                                            17⤵
                                                                                                            • Runs ping.exe
                                                                                                            PID:2852
                                                                                                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                          "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                          16⤵
                                                                                                          • Modifies WinLogon for persistence
                                                                                                          • Checks computer location settings
                                                                                                          • Executes dropped EXE
                                                                                                          • Adds Run key to start application
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies registry class
                                                                                                          PID:2128
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                            17⤵
                                                                                                              PID:5160
                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                18⤵
                                                                                                                • Sets file to hidden
                                                                                                                • Views/modifies file attributes
                                                                                                                PID:5292
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                              17⤵
                                                                                                                PID:5176
                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                  18⤵
                                                                                                                  • Sets file to hidden
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Views/modifies file attributes
                                                                                                                  PID:5312
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                17⤵
                                                                                                                  PID:5216
                                                                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                                                                    ping 127.0.0.1 -n 4
                                                                                                                    18⤵
                                                                                                                    • Runs ping.exe
                                                                                                                    PID:5320
                                                                                                                • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                  "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                  17⤵
                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                  • Checks computer location settings
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Adds Run key to start application
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies registry class
                                                                                                                  PID:5352
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                    18⤵
                                                                                                                      PID:5904
                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                        19⤵
                                                                                                                        • Sets file to hidden
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • Views/modifies file attributes
                                                                                                                        PID:6028
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                      18⤵
                                                                                                                        PID:5912
                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                          19⤵
                                                                                                                          • Sets file to hidden
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Views/modifies file attributes
                                                                                                                          PID:6036
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                        18⤵
                                                                                                                          PID:5948
                                                                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                                                                            ping 127.0.0.1 -n 4
                                                                                                                            19⤵
                                                                                                                            • Runs ping.exe
                                                                                                                            PID:6060
                                                                                                                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                          "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                          18⤵
                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                          • Checks computer location settings
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Adds Run key to start application
                                                                                                                          • Modifies registry class
                                                                                                                          PID:6084
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                            19⤵
                                                                                                                              PID:5292
                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                20⤵
                                                                                                                                • Sets file to hidden
                                                                                                                                • Views/modifies file attributes
                                                                                                                                PID:2808
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                              19⤵
                                                                                                                                PID:1368
                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                  20⤵
                                                                                                                                  • Sets file to hidden
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Views/modifies file attributes
                                                                                                                                  PID:1124
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                19⤵
                                                                                                                                  PID:5152
                                                                                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                    ping 127.0.0.1 -n 4
                                                                                                                                    20⤵
                                                                                                                                    • Runs ping.exe
                                                                                                                                    PID:1004
                                                                                                                                • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                  "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                  19⤵
                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                  • Checks computer location settings
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Adds Run key to start application
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  • Modifies registry class
                                                                                                                                  PID:1900
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                    20⤵
                                                                                                                                      PID:5508
                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                        21⤵
                                                                                                                                        • Sets file to hidden
                                                                                                                                        • Views/modifies file attributes
                                                                                                                                        PID:5684
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                      20⤵
                                                                                                                                        PID:5476
                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                          21⤵
                                                                                                                                          • Sets file to hidden
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Views/modifies file attributes
                                                                                                                                          PID:5576
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                        20⤵
                                                                                                                                          PID:5620
                                                                                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                            ping 127.0.0.1 -n 4
                                                                                                                                            21⤵
                                                                                                                                            • Runs ping.exe
                                                                                                                                            PID:5704
                                                                                                                                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                          "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                          20⤵
                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                          • Checks computer location settings
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • Adds Run key to start application
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:5596
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                            21⤵
                                                                                                                                              PID:5780
                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                22⤵
                                                                                                                                                • Sets file to hidden
                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                PID:5872
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                              21⤵
                                                                                                                                                PID:5800
                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                  22⤵
                                                                                                                                                  • Sets file to hidden
                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                  PID:3148
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                                21⤵
                                                                                                                                                  PID:5340
                                                                                                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                    ping 127.0.0.1 -n 4
                                                                                                                                                    22⤵
                                                                                                                                                    • Runs ping.exe
                                                                                                                                                    PID:5936
                                                                                                                                                • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                  "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                  21⤵
                                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                                  • Checks computer location settings
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  PID:5888
                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                    22⤵
                                                                                                                                                      PID:5856
                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                        23⤵
                                                                                                                                                        • Sets file to hidden
                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                        PID:6124
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                      22⤵
                                                                                                                                                        PID:1580
                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                          23⤵
                                                                                                                                                          • Sets file to hidden
                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                          PID:1936
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                                        22⤵
                                                                                                                                                          PID:6080
                                                                                                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                            ping 127.0.0.1 -n 4
                                                                                                                                                            23⤵
                                                                                                                                                            • Runs ping.exe
                                                                                                                                                            PID:2808
                                                                                                                                                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                          "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                          22⤵
                                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                                          • Checks computer location settings
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          PID:2544
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                            23⤵
                                                                                                                                                              PID:1660
                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                24⤵
                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                PID:5372
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                              23⤵
                                                                                                                                                                PID:1456
                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                  24⤵
                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                  PID:5776
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                                                23⤵
                                                                                                                                                                  PID:5804
                                                                                                                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                    ping 127.0.0.1 -n 4
                                                                                                                                                                    24⤵
                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                    PID:3904
                                                                                                                                                                • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                  "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                                  23⤵
                                                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                  PID:5936
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                    24⤵
                                                                                                                                                                      PID:3060
                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                        25⤵
                                                                                                                                                                        • Sets file to hidden
                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                        PID:3736
                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                      24⤵
                                                                                                                                                                        PID:2732
                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                          25⤵
                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                          PID:5296
                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                                                        24⤵
                                                                                                                                                                          PID:6088
                                                                                                                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                            ping 127.0.0.1 -n 4
                                                                                                                                                                            25⤵
                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                            PID:3620
                                                                                                                                                                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                          "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                                          24⤵
                                                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                          PID:5616
                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                            25⤵
                                                                                                                                                                              PID:5540
                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                                                                                                                                                26⤵
                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                                PID:5660
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                              25⤵
                                                                                                                                                                                PID:5284
                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                                                                                                                                                  26⤵
                                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                                  PID:4528
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                "C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe"
                                                                                                                                                                                25⤵
                                                                                                                                                                                  PID:3508
                                                                                                                                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                    ping 127.0.0.1 -n 4
                                                                                                                                                                                    26⤵
                                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                                    PID:4920
                                                                                                                                                                                • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                                                                                                                                                  "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                                                                                                                                                  25⤵
                                                                                                                                                                                    PID:5568

                                                                                                                                  Network

                                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                                        Replay Monitor

                                                                                                                                        Loading Replay Monitor...

                                                                                                                                        Downloads

                                                                                                                                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe

                                                                                                                                          Filesize

                                                                                                                                          496KB

                                                                                                                                          MD5

                                                                                                                                          2597f68cbc765cab6df481cb363d2ab6

                                                                                                                                          SHA1

                                                                                                                                          883b67ce396816595a736c3cbf8dfc067e4aa243

                                                                                                                                          SHA256

                                                                                                                                          e19dba28bb3f44d5e35b26ce8ae1959e8978abd36b2c0e8bb5a8e77d82de3aea

                                                                                                                                          SHA512

                                                                                                                                          d8e84a00b1de0a13edf868b1e5cd1fe749f9d5667a0d16fe319f55a1f5b6925c233986043514479e600dfae6076b2b6dc75a789b59d530c8a5d264371fb24d27

                                                                                                                                        • memory/1484-93-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/1484-90-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/1664-104-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/1664-107-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/1900-146-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/1900-144-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/1984-119-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/1984-116-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/2128-135-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/2128-131-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/2128-130-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/2544-155-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/2544-160-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/2556-112-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/2556-99-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/2556-95-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/2556-94-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/2556-115-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/3144-103-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/3144-100-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/3144-97-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/3496-67-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/3496-68-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/3496-69-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/3496-73-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/3628-121-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/3628-120-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/3628-125-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/3868-91-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/3868-81-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/3868-79-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/3868-78-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4432-82-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4432-86-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4432-83-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4436-1-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4436-2-0x000000000048C000-0x000000000048E000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          8KB

                                                                                                                                        • memory/4436-4-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4436-3-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4436-0-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4436-66-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4576-71-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4576-74-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4576-77-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4868-124-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4868-129-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4868-126-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4912-87-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4912-89-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4972-111-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/4972-108-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/5352-133-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/5352-138-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/5568-170-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/5596-147-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/5596-150-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/5616-165-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/5616-164-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/5616-168-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/5888-154-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/5888-151-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/5936-157-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/5936-158-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/5936-163-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/6084-143-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/6084-140-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB

                                                                                                                                        • memory/6084-139-0x0000000000400000-0x00000000004E4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          912KB