Analysis
-
max time kernel
13s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
05-07-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe
-
Size
402KB
-
MD5
272b27c346bc90197560e4d20005e64d
-
SHA1
cf3477547e2db74b9f44f97290027a4c2b64418d
-
SHA256
a54a2e38e9474952b6a3663963178cc62b16b94d8f1fab0f4b1435cd1684c021
-
SHA512
9494016d3e5877b7763aa26aced3889c4f54541abd3a994204ada3b97e6e594b6b9cb84271b55b9a7ff5e99ce6e760280aab89957437566c20cc69061318fe31
-
SSDEEP
12288:0Zxks+GyLWj6oBNxzkGzpkQaiJXVedK1ZDEwjahP:0/+cBNxzkYkPiJleM9ba
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Extracted
darkcomet
Guest16_min
para23.no-ip.biz:1604
DCMIN_MUTEX-QQSAEK6
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
TzBAaQZC6rwl
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
DarkComet RAT
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
272b27c346bc90197560e4d20005e64d_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\DCSCMIN\\IMDCSC.exe" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 6 IoCs
Processes:
272b27c346bc90197560e4d20005e64d_JaffaCakes118.exeIMDCSC.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" IMDCSC.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" IMDCSC.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" IMDCSC.exe -
Processes:
272b27c346bc90197560e4d20005e64d_JaffaCakes118.exeIMDCSC.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IMDCSC.exe -
Processes:
272b27c346bc90197560e4d20005e64d_JaffaCakes118.exeIMDCSC.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" IMDCSC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" IMDCSC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" IMDCSC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" IMDCSC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" IMDCSC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" IMDCSC.exe -
Disables RegEdit via registry modification 2 IoCs
Processes:
IMDCSC.exe272b27c346bc90197560e4d20005e64d_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" IMDCSC.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
IMDCSC.exepid process 2384 IMDCSC.exe -
Loads dropped DLL 2 IoCs
Processes:
272b27c346bc90197560e4d20005e64d_JaffaCakes118.exepid process 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/3036-0-0x0000000002090000-0x000000000311E000-memory.dmp upx behavioral1/memory/3036-4-0x0000000002090000-0x000000000311E000-memory.dmp upx behavioral1/memory/3036-2-0x0000000002090000-0x000000000311E000-memory.dmp upx behavioral1/memory/3036-8-0x0000000002090000-0x000000000311E000-memory.dmp upx behavioral1/memory/3036-7-0x0000000002090000-0x000000000311E000-memory.dmp upx behavioral1/memory/3036-9-0x0000000002090000-0x000000000311E000-memory.dmp upx behavioral1/memory/3036-6-0x0000000002090000-0x000000000311E000-memory.dmp upx behavioral1/memory/3036-3-0x0000000002090000-0x000000000311E000-memory.dmp upx behavioral1/memory/3036-10-0x0000000002090000-0x000000000311E000-memory.dmp upx behavioral1/memory/3036-26-0x0000000002090000-0x000000000311E000-memory.dmp upx behavioral1/memory/2384-54-0x0000000002080000-0x000000000310E000-memory.dmp upx behavioral1/memory/2384-65-0x0000000002080000-0x000000000310E000-memory.dmp upx behavioral1/memory/2384-66-0x0000000002080000-0x000000000310E000-memory.dmp upx behavioral1/memory/2384-58-0x0000000002080000-0x000000000310E000-memory.dmp upx behavioral1/memory/2384-56-0x0000000002080000-0x000000000310E000-memory.dmp upx behavioral1/memory/2384-64-0x0000000002080000-0x000000000310E000-memory.dmp upx behavioral1/memory/2384-62-0x0000000002080000-0x000000000310E000-memory.dmp upx behavioral1/memory/2384-61-0x0000000002080000-0x000000000310E000-memory.dmp upx behavioral1/memory/2384-59-0x0000000002080000-0x000000000310E000-memory.dmp upx behavioral1/memory/2384-57-0x0000000002080000-0x000000000310E000-memory.dmp upx behavioral1/memory/2384-55-0x0000000002080000-0x000000000310E000-memory.dmp upx behavioral1/memory/2384-52-0x0000000002080000-0x000000000310E000-memory.dmp upx behavioral1/memory/3036-50-0x0000000002090000-0x000000000311E000-memory.dmp upx behavioral1/memory/3036-27-0x0000000002090000-0x000000000311E000-memory.dmp upx behavioral1/memory/2384-141-0x0000000002080000-0x000000000310E000-memory.dmp upx -
Processes:
272b27c346bc90197560e4d20005e64d_JaffaCakes118.exeIMDCSC.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" IMDCSC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" IMDCSC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" IMDCSC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" IMDCSC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" IMDCSC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" IMDCSC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc IMDCSC.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
272b27c346bc90197560e4d20005e64d_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\DarkComet RAT = "C:\\Users\\Admin\\Documents\\DCSCMIN\\IMDCSC.exe" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe -
Processes:
IMDCSC.exe272b27c346bc90197560e4d20005e64d_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IMDCSC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
Processes:
272b27c346bc90197560e4d20005e64d_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
272b27c346bc90197560e4d20005e64d_JaffaCakes118.exeIMDCSC.exepid process 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe 2384 IMDCSC.exe 2384 IMDCSC.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
Processes:
272b27c346bc90197560e4d20005e64d_JaffaCakes118.exeIMDCSC.exedescription pid process Token: SeDebugPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeDebugPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeDebugPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeDebugPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeSecurityPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeLoadDriverPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeSystemProfilePrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeSystemtimePrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeBackupPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeRestorePrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeShutdownPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeDebugPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeUndockPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeManageVolumePrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeImpersonatePrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: 33 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: 34 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: 35 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeDebugPrivilege 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2384 IMDCSC.exe Token: SeSecurityPrivilege 2384 IMDCSC.exe Token: SeTakeOwnershipPrivilege 2384 IMDCSC.exe Token: SeLoadDriverPrivilege 2384 IMDCSC.exe Token: SeSystemProfilePrivilege 2384 IMDCSC.exe Token: SeSystemtimePrivilege 2384 IMDCSC.exe Token: SeProfSingleProcessPrivilege 2384 IMDCSC.exe Token: SeIncBasePriorityPrivilege 2384 IMDCSC.exe Token: SeCreatePagefilePrivilege 2384 IMDCSC.exe Token: SeBackupPrivilege 2384 IMDCSC.exe Token: SeRestorePrivilege 2384 IMDCSC.exe Token: SeShutdownPrivilege 2384 IMDCSC.exe Token: SeDebugPrivilege 2384 IMDCSC.exe Token: SeSystemEnvironmentPrivilege 2384 IMDCSC.exe Token: SeChangeNotifyPrivilege 2384 IMDCSC.exe Token: SeRemoteShutdownPrivilege 2384 IMDCSC.exe Token: SeUndockPrivilege 2384 IMDCSC.exe Token: SeManageVolumePrivilege 2384 IMDCSC.exe Token: SeImpersonatePrivilege 2384 IMDCSC.exe Token: SeCreateGlobalPrivilege 2384 IMDCSC.exe Token: 33 2384 IMDCSC.exe Token: 34 2384 IMDCSC.exe Token: 35 2384 IMDCSC.exe Token: SeDebugPrivilege 2384 IMDCSC.exe Token: SeDebugPrivilege 2384 IMDCSC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
IMDCSC.exepid process 2384 IMDCSC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
272b27c346bc90197560e4d20005e64d_JaffaCakes118.exeIMDCSC.exedescription pid process target process PID 3036 wrote to memory of 1068 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe taskhost.exe PID 3036 wrote to memory of 1168 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Dwm.exe PID 3036 wrote to memory of 1192 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Explorer.EXE PID 3036 wrote to memory of 1596 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe DllHost.exe PID 3036 wrote to memory of 2384 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe IMDCSC.exe PID 3036 wrote to memory of 2384 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe IMDCSC.exe PID 3036 wrote to memory of 2384 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe IMDCSC.exe PID 3036 wrote to memory of 2384 3036 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe IMDCSC.exe PID 2384 wrote to memory of 1068 2384 IMDCSC.exe taskhost.exe PID 2384 wrote to memory of 1168 2384 IMDCSC.exe Dwm.exe PID 2384 wrote to memory of 1192 2384 IMDCSC.exe Explorer.EXE PID 2384 wrote to memory of 1596 2384 IMDCSC.exe DllHost.exe PID 2384 wrote to memory of 1068 2384 IMDCSC.exe taskhost.exe PID 2384 wrote to memory of 1168 2384 IMDCSC.exe Dwm.exe PID 2384 wrote to memory of 1192 2384 IMDCSC.exe Explorer.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
272b27c346bc90197560e4d20005e64d_JaffaCakes118.exeIMDCSC.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IMDCSC.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\272b27c346bc90197560e4d20005e64d_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exe"3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Documents\DCSCMIN\IMDCSC.exeFilesize
402KB
MD5272b27c346bc90197560e4d20005e64d
SHA1cf3477547e2db74b9f44f97290027a4c2b64418d
SHA256a54a2e38e9474952b6a3663963178cc62b16b94d8f1fab0f4b1435cd1684c021
SHA5129494016d3e5877b7763aa26aced3889c4f54541abd3a994204ada3b97e6e594b6b9cb84271b55b9a7ff5e99ce6e760280aab89957437566c20cc69061318fe31
-
C:\Windows\SYSTEM.INIFilesize
257B
MD5eb16cc3010bdbabeee4d6517e72f6416
SHA1598d6ef3966a163c64cd0f061c3115a5d3a673e3
SHA2564ff89e3861f195b0afb777e488c5a57715f60ea34f6000195b07fb0b7fe7d876
SHA512886f6c8227ad25aeaf891e87319dce09bdc12692b3e452c4db0c68d01c5987cf937baff7fd4d6730eeb4ca19ceaf744ea24ea28c15996d6e9afaae0ce67980b2
-
memory/1068-11-0x0000000000390000-0x0000000000392000-memory.dmpFilesize
8KB
-
memory/2384-59-0x0000000002080000-0x000000000310E000-memory.dmpFilesize
16.6MB
-
memory/2384-57-0x0000000002080000-0x000000000310E000-memory.dmpFilesize
16.6MB
-
memory/2384-147-0x00000000040D0000-0x00000000040D2000-memory.dmpFilesize
8KB
-
memory/2384-80-0x00000000040D0000-0x00000000040D2000-memory.dmpFilesize
8KB
-
memory/2384-79-0x0000000005260000-0x0000000005261000-memory.dmpFilesize
4KB
-
memory/2384-52-0x0000000002080000-0x000000000310E000-memory.dmpFilesize
16.6MB
-
memory/2384-55-0x0000000002080000-0x000000000310E000-memory.dmpFilesize
16.6MB
-
memory/2384-61-0x0000000002080000-0x000000000310E000-memory.dmpFilesize
16.6MB
-
memory/2384-62-0x0000000002080000-0x000000000310E000-memory.dmpFilesize
16.6MB
-
memory/2384-63-0x00000000002E0000-0x00000000002E1000-memory.dmpFilesize
4KB
-
memory/2384-64-0x0000000002080000-0x000000000310E000-memory.dmpFilesize
16.6MB
-
memory/2384-56-0x0000000002080000-0x000000000310E000-memory.dmpFilesize
16.6MB
-
memory/2384-66-0x0000000002080000-0x000000000310E000-memory.dmpFilesize
16.6MB
-
memory/2384-58-0x0000000002080000-0x000000000310E000-memory.dmpFilesize
16.6MB
-
memory/2384-141-0x0000000002080000-0x000000000310E000-memory.dmpFilesize
16.6MB
-
memory/2384-54-0x0000000002080000-0x000000000310E000-memory.dmpFilesize
16.6MB
-
memory/2384-81-0x00000000040D0000-0x00000000040D2000-memory.dmpFilesize
8KB
-
memory/2384-65-0x0000000002080000-0x000000000310E000-memory.dmpFilesize
16.6MB
-
memory/3036-46-0x0000000001F40000-0x0000000001F42000-memory.dmpFilesize
8KB
-
memory/3036-20-0x0000000001F40000-0x0000000001F42000-memory.dmpFilesize
8KB
-
memory/3036-9-0x0000000002090000-0x000000000311E000-memory.dmpFilesize
16.6MB
-
memory/3036-4-0x0000000002090000-0x000000000311E000-memory.dmpFilesize
16.6MB
-
memory/3036-2-0x0000000002090000-0x000000000311E000-memory.dmpFilesize
16.6MB
-
memory/3036-10-0x0000000002090000-0x000000000311E000-memory.dmpFilesize
16.6MB
-
memory/3036-0-0x0000000002090000-0x000000000311E000-memory.dmpFilesize
16.6MB
-
memory/3036-7-0x0000000002090000-0x000000000311E000-memory.dmpFilesize
16.6MB
-
memory/3036-30-0x0000000001F40000-0x0000000001F42000-memory.dmpFilesize
8KB
-
memory/3036-26-0x0000000002090000-0x000000000311E000-memory.dmpFilesize
16.6MB
-
memory/3036-23-0x00000000039C0000-0x00000000039C1000-memory.dmpFilesize
4KB
-
memory/3036-5-0x00000000003A0000-0x00000000003A1000-memory.dmpFilesize
4KB
-
memory/3036-3-0x0000000002090000-0x000000000311E000-memory.dmpFilesize
16.6MB
-
memory/3036-50-0x0000000002090000-0x000000000311E000-memory.dmpFilesize
16.6MB
-
memory/3036-27-0x0000000002090000-0x000000000311E000-memory.dmpFilesize
16.6MB
-
memory/3036-49-0x0000000000400000-0x0000000000527000-memory.dmpFilesize
1.2MB
-
memory/3036-21-0x00000000039C0000-0x00000000039C1000-memory.dmpFilesize
4KB
-
memory/3036-6-0x0000000002090000-0x000000000311E000-memory.dmpFilesize
16.6MB
-
memory/3036-8-0x0000000002090000-0x000000000311E000-memory.dmpFilesize
16.6MB