Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-07-2024 03:52

General

  • Target

    4819ac7420498073e2f939de3bdcf120_JaffaCakes118.exe

  • Size

    692KB

  • MD5

    4819ac7420498073e2f939de3bdcf120

  • SHA1

    bd1a83e2b4987bee30a0f14cbaf685b26821d4e7

  • SHA256

    718208741ba5d91b828e357adeb9622f9710c0d422f14846fce044c43adbfbf3

  • SHA512

    ce1c2d4693a62bf8e832479c355caa4c79b38c6682a966390938bde724e5980ac87b7c081dc76809bd8f2d63ef3fa995f889b039c12c653ca9e0286cf27f8148

  • SSDEEP

    12288:cXhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy452US:KnAw2WWeFcfbP9VPSPMTSPL/rWvzq4JC

Malware Config

Extracted

Family

darkcomet

Botnet

12

C2

tomcol.no-ip.info:1604

Mutex

DC_MUTEX-FWUB5XJ

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    u84K4144AzcZ

  • install

    true

  • offline_keylogger

    true

  • password

    tomcol

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 1 IoCs
  • Sets file to hidden 1 TTPs 24 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Modifies registry class 11 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4819ac7420498073e2f939de3bdcf120_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4819ac7420498073e2f939de3bdcf120_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\4819ac7420498073e2f939de3bdcf120_JaffaCakes118.exe" +s +h
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp\4819ac7420498073e2f939de3bdcf120_JaffaCakes118.exe" +s +h
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:5104
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Windows\SysWOW64\attrib.exe
        attrib "C:\Users\Admin\AppData\Local\Temp" +s +h
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:3312
    • C:\Windows\SysWOW64\notepad.exe
      notepad
      2⤵
      • Deletes itself
      PID:4924
    • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
      "C:\Windows\system32\MSDCSC\msdcsc.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3976
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3632
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
          4⤵
          • Sets file to hidden
          • Drops file in System32 directory
          • Views/modifies file attributes
          PID:3432
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2212
        • C:\Windows\SysWOW64\attrib.exe
          attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
          4⤵
          • Sets file to hidden
          • Drops file in System32 directory
          • Views/modifies file attributes
          PID:3392
      • C:\Windows\SysWOW64\notepad.exe
        notepad
        3⤵
          PID:3388
        • C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\msdcsc.exe
          "C:\Windows\system32\MSDCSC\u84K4144AzcZ\msdcsc.exe"
          3⤵
          • Modifies WinLogon for persistence
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          PID:4116
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\msdcsc.exe" +s +h
            4⤵
              PID:3276
              • C:\Windows\SysWOW64\attrib.exe
                attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\msdcsc.exe" +s +h
                5⤵
                • Sets file to hidden
                • Drops file in System32 directory
                • Views/modifies file attributes
                PID:4912
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ" +s +h
              4⤵
                PID:1460
                • C:\Windows\SysWOW64\attrib.exe
                  attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ" +s +h
                  5⤵
                  • Sets file to hidden
                  • Drops file in System32 directory
                  • Views/modifies file attributes
                  PID:3624
              • C:\Windows\SysWOW64\notepad.exe
                notepad
                4⤵
                  PID:2732
                • C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ\msdcsc.exe
                  "C:\Windows\system32\MSDCSC\u84K4144AzcZ\u84K4144AzcZ\msdcsc.exe"
                  4⤵
                  • Modifies WinLogon for persistence
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Drops file in System32 directory
                  • Modifies registry class
                  PID:2788
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ\msdcsc.exe" +s +h
                    5⤵
                      PID:676
                      • C:\Windows\SysWOW64\attrib.exe
                        attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ\msdcsc.exe" +s +h
                        6⤵
                        • Sets file to hidden
                        • Drops file in System32 directory
                        • Views/modifies file attributes
                        PID:2664
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ" +s +h
                      5⤵
                        PID:1540
                        • C:\Windows\SysWOW64\attrib.exe
                          attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ" +s +h
                          6⤵
                          • Sets file to hidden
                          • Drops file in System32 directory
                          • Views/modifies file attributes
                          PID:64
                      • C:\Windows\SysWOW64\notepad.exe
                        notepad
                        5⤵
                          PID:2808
                        • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                          "C:\Windows\system32\MSDCSC\msdcsc.exe"
                          5⤵
                          • Modifies WinLogon for persistence
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Drops file in System32 directory
                          • Modifies registry class
                          PID:2584
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                            6⤵
                              PID:2696
                              • C:\Windows\SysWOW64\attrib.exe
                                attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                7⤵
                                • Sets file to hidden
                                • Drops file in System32 directory
                                • Views/modifies file attributes
                                PID:4304
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                              6⤵
                                PID:2988
                                • C:\Windows\SysWOW64\attrib.exe
                                  attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                  7⤵
                                  • Sets file to hidden
                                  • Drops file in System32 directory
                                  • Views/modifies file attributes
                                  PID:1648
                              • C:\Windows\SysWOW64\notepad.exe
                                notepad
                                6⤵
                                  PID:1408
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 348
                                    7⤵
                                    • Program crash
                                    PID:3944
                                • C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\msdcsc.exe
                                  "C:\Windows\system32\MSDCSC\u84K4144AzcZ\msdcsc.exe"
                                  6⤵
                                  • Modifies WinLogon for persistence
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  • Drops file in System32 directory
                                  • Modifies registry class
                                  PID:4380
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\msdcsc.exe" +s +h
                                    7⤵
                                      PID:4724
                                      • C:\Windows\SysWOW64\attrib.exe
                                        attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\msdcsc.exe" +s +h
                                        8⤵
                                        • Sets file to hidden
                                        • Drops file in System32 directory
                                        • Views/modifies file attributes
                                        PID:3468
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ" +s +h
                                      7⤵
                                        PID:4968
                                        • C:\Windows\SysWOW64\attrib.exe
                                          attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ" +s +h
                                          8⤵
                                          • Sets file to hidden
                                          • Drops file in System32 directory
                                          • Views/modifies file attributes
                                          PID:4676
                                      • C:\Windows\SysWOW64\notepad.exe
                                        notepad
                                        7⤵
                                          PID:1764
                                        • C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ\msdcsc.exe
                                          "C:\Windows\system32\MSDCSC\u84K4144AzcZ\u84K4144AzcZ\msdcsc.exe"
                                          7⤵
                                          • Modifies WinLogon for persistence
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          • Drops file in System32 directory
                                          • Modifies registry class
                                          PID:3912
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ\msdcsc.exe" +s +h
                                            8⤵
                                              PID:3920
                                              • C:\Windows\SysWOW64\attrib.exe
                                                attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ\msdcsc.exe" +s +h
                                                9⤵
                                                • Sets file to hidden
                                                • Drops file in System32 directory
                                                • Views/modifies file attributes
                                                PID:1288
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ" +s +h
                                              8⤵
                                                PID:5000
                                                • C:\Windows\SysWOW64\attrib.exe
                                                  attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ" +s +h
                                                  9⤵
                                                  • Sets file to hidden
                                                  • Drops file in System32 directory
                                                  • Views/modifies file attributes
                                                  PID:660
                                              • C:\Windows\SysWOW64\notepad.exe
                                                notepad
                                                8⤵
                                                  PID:2396
                                                • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
                                                  "C:\Windows\system32\MSDCSC\msdcsc.exe"
                                                  8⤵
                                                  • Modifies WinLogon for persistence
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Adds Run key to start application
                                                  • Drops file in System32 directory
                                                  • Modifies registry class
                                                  PID:1076
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                    9⤵
                                                      PID:3692
                                                      • C:\Windows\SysWOW64\attrib.exe
                                                        attrib "C:\Windows\SysWOW64\MSDCSC\msdcsc.exe" +s +h
                                                        10⤵
                                                        • Sets file to hidden
                                                        • Drops file in System32 directory
                                                        • Views/modifies file attributes
                                                        PID:4440
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                      9⤵
                                                        PID:2032
                                                        • C:\Windows\SysWOW64\attrib.exe
                                                          attrib "C:\Windows\SysWOW64\MSDCSC" +s +h
                                                          10⤵
                                                          • Sets file to hidden
                                                          • Drops file in System32 directory
                                                          • Views/modifies file attributes
                                                          PID:3468
                                                      • C:\Windows\SysWOW64\notepad.exe
                                                        notepad
                                                        9⤵
                                                          PID:3820
                                                        • C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\msdcsc.exe
                                                          "C:\Windows\system32\MSDCSC\u84K4144AzcZ\msdcsc.exe"
                                                          9⤵
                                                          • Modifies WinLogon for persistence
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Drops file in System32 directory
                                                          • Modifies registry class
                                                          PID:3472
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\msdcsc.exe" +s +h
                                                            10⤵
                                                              PID:3780
                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\msdcsc.exe" +s +h
                                                                11⤵
                                                                • Sets file to hidden
                                                                • Drops file in System32 directory
                                                                • Views/modifies file attributes
                                                                PID:4936
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ" +s +h
                                                              10⤵
                                                                PID:2296
                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                  attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ" +s +h
                                                                  11⤵
                                                                  • Sets file to hidden
                                                                  • Drops file in System32 directory
                                                                  • Views/modifies file attributes
                                                                  PID:3608
                                                              • C:\Windows\SysWOW64\notepad.exe
                                                                notepad
                                                                10⤵
                                                                  PID:4060
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 184
                                                                    11⤵
                                                                    • Program crash
                                                                    PID:3868
                                                                • C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ\msdcsc.exe
                                                                  "C:\Windows\system32\MSDCSC\u84K4144AzcZ\u84K4144AzcZ\msdcsc.exe"
                                                                  10⤵
                                                                  • Modifies WinLogon for persistence
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • Adds Run key to start application
                                                                  • Drops file in System32 directory
                                                                  • Modifies registry class
                                                                  PID:1832
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ\msdcsc.exe" +s +h
                                                                    11⤵
                                                                      PID:528
                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ\msdcsc.exe" +s +h
                                                                        12⤵
                                                                        • Sets file to hidden
                                                                        • Drops file in System32 directory
                                                                        • Views/modifies file attributes
                                                                        PID:2484
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ" +s +h
                                                                      11⤵
                                                                        PID:3312
                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                          attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ" +s +h
                                                                          12⤵
                                                                          • Sets file to hidden
                                                                          • Drops file in System32 directory
                                                                          • Views/modifies file attributes
                                                                          PID:1500
                                                                      • C:\Windows\SysWOW64\notepad.exe
                                                                        notepad
                                                                        11⤵
                                                                          PID:2028
                                                                        • C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ\msdcsc.exe
                                                                          "C:\Windows\system32\MSDCSC\u84K4144AzcZ\u84K4144AzcZ\msdcsc.exe"
                                                                          11⤵
                                                                          • Modifies WinLogon for persistence
                                                                          • Checks computer location settings
                                                                          • Executes dropped EXE
                                                                          • Adds Run key to start application
                                                                          • Drops file in System32 directory
                                                                          • Modifies registry class
                                                                          PID:5116
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ\msdcsc.exe" +s +h
                                                                            12⤵
                                                                              PID:3936
                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ\msdcsc.exe" +s +h
                                                                                13⤵
                                                                                • Sets file to hidden
                                                                                • Drops file in System32 directory
                                                                                • Views/modifies file attributes
                                                                                PID:2864
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ" +s +h
                                                                              12⤵
                                                                                PID:912
                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                  attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\u84K4144AzcZ" +s +h
                                                                                  13⤵
                                                                                  • Sets file to hidden
                                                                                  • Drops file in System32 directory
                                                                                  • Views/modifies file attributes
                                                                                  PID:2784
                                                                              • C:\Windows\SysWOW64\notepad.exe
                                                                                notepad
                                                                                12⤵
                                                                                  PID:4480
                                                                                • C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\msdcsc.exe
                                                                                  "C:\Windows\system32\MSDCSC\u84K4144AzcZ\msdcsc.exe"
                                                                                  12⤵
                                                                                  • Modifies WinLogon for persistence
                                                                                  • Modifies firewall policy service
                                                                                  • Modifies security service
                                                                                  • Windows security bypass
                                                                                  • Checks computer location settings
                                                                                  • Executes dropped EXE
                                                                                  • Windows security modification
                                                                                  • Adds Run key to start application
                                                                                  • Drops file in System32 directory
                                                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:920
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\msdcsc.exe" +s +h
                                                                                    13⤵
                                                                                      PID:660
                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                        attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ\msdcsc.exe" +s +h
                                                                                        14⤵
                                                                                        • Sets file to hidden
                                                                                        • Drops file in System32 directory
                                                                                        • Views/modifies file attributes
                                                                                        PID:872
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ" +s +h
                                                                                      13⤵
                                                                                        PID:4080
                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                          attrib "C:\Windows\SysWOW64\MSDCSC\u84K4144AzcZ" +s +h
                                                                                          14⤵
                                                                                          • Sets file to hidden
                                                                                          • Drops file in System32 directory
                                                                                          • Views/modifies file attributes
                                                                                          PID:1908
                                                                                      • C:\Windows\SysWOW64\notepad.exe
                                                                                        notepad
                                                                                        13⤵
                                                                                          PID:3528
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3528 -s 84
                                                                                            14⤵
                                                                                            • Program crash
                                                                                            PID:1632
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1408 -ip 1408
                                                                  1⤵
                                                                    PID:2244
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4060 -ip 4060
                                                                    1⤵
                                                                      PID:2232
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3528 -ip 3528
                                                                      1⤵
                                                                        PID:1848

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe

                                                                        Filesize

                                                                        692KB

                                                                        MD5

                                                                        4819ac7420498073e2f939de3bdcf120

                                                                        SHA1

                                                                        bd1a83e2b4987bee30a0f14cbaf685b26821d4e7

                                                                        SHA256

                                                                        718208741ba5d91b828e357adeb9622f9710c0d422f14846fce044c43adbfbf3

                                                                        SHA512

                                                                        ce1c2d4693a62bf8e832479c355caa4c79b38c6682a966390938bde724e5980ac87b7c081dc76809bd8f2d63ef3fa995f889b039c12c653ca9e0286cf27f8148

                                                                      • memory/920-637-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB

                                                                      • memory/920-644-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB

                                                                      • memory/920-643-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB

                                                                      • memory/920-642-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB

                                                                      • memory/920-641-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB

                                                                      • memory/920-640-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB

                                                                      • memory/920-639-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB

                                                                      • memory/1076-502-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB

                                                                      • memory/1828-0-0x0000000002140000-0x0000000002141000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/1828-62-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB

                                                                      • memory/1832-569-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB

                                                                      • memory/2584-313-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB

                                                                      • memory/2788-250-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB

                                                                      • memory/3472-565-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB

                                                                      • memory/3528-636-0x0000000000D60000-0x0000000000D61000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/3912-439-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB

                                                                      • memory/3976-124-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB

                                                                      • memory/4116-188-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB

                                                                      • memory/4380-376-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB

                                                                      • memory/4924-3-0x0000000000550000-0x0000000000551000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/5116-632-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                        Filesize

                                                                        756KB