Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 05:24
Behavioral task
behavioral1
Sample
f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe
Resource
win7-20240705-en
General
-
Target
f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe
-
Size
1.0MB
-
MD5
766a48198b5f332debc69cf1e0e87bbf
-
SHA1
d805b0ee573788f94375d87b2d8af5a3f56e6ef4
-
SHA256
f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d
-
SHA512
5ae3a2e7af67b20b16a9f4f077449074b3d63ae24108027bc2bded3eecc4cebb1f225ef0c96dca24f736c51867f96878bb18c8f08d4bb6b0729b75724102c749
-
SSDEEP
24576:MKiRzC0UAaNSl3Jx5/16qCTF6RQHDO1AZ8S:NiRnMSp5N6PTfi1AZ8S
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:555
DC_MUTEX-13GPHC5
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
ACocCp43TdEV
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe -
r77 rootkit payload 1 IoCs
Detects the payload of the r77 rootkit.
resource yara_rule behavioral1/files/0x000800000001613a-7.dat r77_payload -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msdcsc.exe -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2772 attrib.exe 2784 attrib.exe -
Deletes itself 1 IoCs
pid Process 2776 notepad.exe -
Executes dropped EXE 3 IoCs
pid Process 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2700 msdcsc.exe 1244 Process not Found -
Loads dropped DLL 3 IoCs
pid Process 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe -
resource yara_rule behavioral1/memory/3064-0-0x0000000000400000-0x0000000000621000-memory.dmp upx behavioral1/files/0x0008000000015fd2-41.dat upx behavioral1/memory/3064-47-0x00000000038B0000-0x0000000003AD1000-memory.dmp upx behavioral1/memory/3064-91-0x0000000000400000-0x0000000000621000-memory.dmp upx behavioral1/memory/2700-118-0x0000000000400000-0x0000000000621000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2700 msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeSecurityPrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeTakeOwnershipPrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeLoadDriverPrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeSystemProfilePrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeSystemtimePrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeProfSingleProcessPrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeIncBasePriorityPrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeCreatePagefilePrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeBackupPrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeRestorePrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeShutdownPrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeDebugPrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeSystemEnvironmentPrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeChangeNotifyPrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeRemoteShutdownPrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeUndockPrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeManageVolumePrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeImpersonatePrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeCreateGlobalPrivilege 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: 33 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: 34 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: 35 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe Token: SeDebugPrivilege 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE Token: SeIncreaseQuotaPrivilege 2700 msdcsc.exe Token: SeSecurityPrivilege 2700 msdcsc.exe Token: SeTakeOwnershipPrivilege 2700 msdcsc.exe Token: SeLoadDriverPrivilege 2700 msdcsc.exe Token: SeSystemProfilePrivilege 2700 msdcsc.exe Token: SeSystemtimePrivilege 2700 msdcsc.exe Token: SeProfSingleProcessPrivilege 2700 msdcsc.exe Token: SeIncBasePriorityPrivilege 2700 msdcsc.exe Token: SeCreatePagefilePrivilege 2700 msdcsc.exe Token: SeBackupPrivilege 2700 msdcsc.exe Token: SeRestorePrivilege 2700 msdcsc.exe Token: SeShutdownPrivilege 2700 msdcsc.exe Token: SeDebugPrivilege 2700 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2700 msdcsc.exe Token: SeChangeNotifyPrivilege 2700 msdcsc.exe Token: SeRemoteShutdownPrivilege 2700 msdcsc.exe Token: SeUndockPrivilege 2700 msdcsc.exe Token: SeManageVolumePrivilege 2700 msdcsc.exe Token: SeImpersonatePrivilege 2700 msdcsc.exe Token: SeCreateGlobalPrivilege 2700 msdcsc.exe Token: 33 2700 msdcsc.exe Token: 34 2700 msdcsc.exe Token: 35 2700 msdcsc.exe Token: SeDebugPrivilege 2800 CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2700 msdcsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3064 wrote to memory of 3008 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 29 PID 3064 wrote to memory of 3008 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 29 PID 3064 wrote to memory of 3008 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 29 PID 3064 wrote to memory of 3008 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 29 PID 3064 wrote to memory of 3004 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 31 PID 3064 wrote to memory of 3004 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 31 PID 3064 wrote to memory of 3004 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 31 PID 3064 wrote to memory of 3004 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 31 PID 3004 wrote to memory of 2784 3004 cmd.exe 33 PID 3004 wrote to memory of 2784 3004 cmd.exe 33 PID 3004 wrote to memory of 2784 3004 cmd.exe 33 PID 3004 wrote to memory of 2784 3004 cmd.exe 33 PID 3008 wrote to memory of 2772 3008 cmd.exe 34 PID 3008 wrote to memory of 2772 3008 cmd.exe 34 PID 3008 wrote to memory of 2772 3008 cmd.exe 34 PID 3008 wrote to memory of 2772 3008 cmd.exe 34 PID 3064 wrote to memory of 2800 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 35 PID 3064 wrote to memory of 2800 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 35 PID 3064 wrote to memory of 2800 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 35 PID 3064 wrote to memory of 2800 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 35 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2776 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 36 PID 3064 wrote to memory of 2700 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 37 PID 3064 wrote to memory of 2700 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 37 PID 3064 wrote to memory of 2700 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 37 PID 3064 wrote to memory of 2700 3064 f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe 37 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 PID 2700 wrote to memory of 2352 2700 msdcsc.exe 38 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2784 attrib.exe 2772 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe"C:\Users\Admin\AppData\Local\Temp\f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d.exe" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2772
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2784
-
-
-
C:\Users\Admin\AppData\Local\Temp\CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE"C:\Users\Admin\AppData\Local\Temp\CYBERPUNK 2077 V1.03-V1.5 PLUS 32 TRAINER.EXE"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- Deletes itself
PID:2776
-
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"2⤵
- Modifies firewall policy service
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵PID:2352
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29B
MD5100ad43a6e39d44013fad7f3aa343e3b
SHA1dc8050bdee8a74354cb4a2057e4e703e7a460943
SHA256a7b15ee77dd0db946e7fdbf574889bd30c23fa3d7bff6d509df118595ee14ec5
SHA51220f9b26416804f917d0642d35de32ccae0849c34bff4eb75c6450b1ee83756f3275850101d7482eb59c78356b1489c2d4db6cd95ae9b72b64d5eeab700d36ba8
-
Filesize
1.0MB
MD5766a48198b5f332debc69cf1e0e87bbf
SHA1d805b0ee573788f94375d87b2d8af5a3f56e6ef4
SHA256f1d61cbcda0b9784bb33b45d96f98b3e027a6b5cfe89552e47d15038dedff23d
SHA5125ae3a2e7af67b20b16a9f4f077449074b3d63ae24108027bc2bded3eecc4cebb1f225ef0c96dca24f736c51867f96878bb18c8f08d4bb6b0729b75724102c749
-
Filesize
1.4MB
MD5fe94c9259ac762233bf198684cf322b6
SHA1a07a7d3a357fa600454dec4f666a556f61fdfb31
SHA256e783e443dea1898fb87cbf0fedf713afdf38947b9677c2a428fd8e02e725f297
SHA512037e6e7a3954a97068749a1570daf7f3b1e43cabd02b867a2261976e07b44228e3ba52de39a42985d12f672523bae0aef92b92be8a440c8ddaef94f9bf833eb3