Malware Analysis Report

2025-04-13 23:13

Sample ID 240722-2hq2jsscma
Target 65115173fb1e7ac067de48d48409e2f5_JaffaCakes118
SHA256 846789c651a77d10528f9bc3efc108381f1b99593cd38679b2343fcaf6b65dbc
Tags
darkcomet evasion persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

846789c651a77d10528f9bc3efc108381f1b99593cd38679b2343fcaf6b65dbc

Threat Level: Known bad

The file 65115173fb1e7ac067de48d48409e2f5_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

darkcomet evasion persistence rat trojan

Modifies security service

Darkcomet family

Modifies firewall policy service

Windows security bypass

Darkcomet

Modifies WinLogon for persistence

Disables Task Manager via registry modification

Disables RegEdit via registry modification

Sets file to hidden

Loads dropped DLL

Checks computer location settings

Executes dropped EXE

Windows security modification

Adds Run key to start application

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

System policy modification

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Views/modifies file attributes

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-07-22 22:35

Signatures

Darkcomet family

darkcomet

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-22 22:35

Reported

2024-07-22 23:36

Platform

win7-20240708-en

Max time kernel

118s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A

Modifies firewall policy service

evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Modifies security service

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Disables RegEdit via registry modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Disables Task Manager via registry modification

evasion

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1528 set thread context of 2612 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: 33 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: 34 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: 35 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSecurityPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemtimePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeBackupPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeRestorePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeUndockPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeManageVolumePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2672 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 2888 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2672 wrote to memory of 1528 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
PID 2672 wrote to memory of 1528 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
PID 2672 wrote to memory of 1528 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
PID 2672 wrote to memory of 1528 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
PID 1528 wrote to memory of 2612 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 1528 wrote to memory of 2612 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 1528 wrote to memory of 2612 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 1528 wrote to memory of 2612 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 2904 wrote to memory of 2632 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2904 wrote to memory of 2632 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2904 wrote to memory of 2632 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2904 wrote to memory of 2632 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2888 wrote to memory of 2644 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2888 wrote to memory of 2644 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2888 wrote to memory of 2644 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 2888 wrote to memory of 2644 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 1528 wrote to memory of 2612 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 1528 wrote to memory of 2612 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe

System policy modification

evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "

C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe

"C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe"

C:\Program Files (x86)\Internet Explorer\iexplore.exe

"C:\Program Files (x86)\Internet Explorer\iexplore.exe"

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

Network

N/A

Files

memory/2672-0-0x00000000002F0000-0x00000000002F1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat

MD5 e8ac9194bee64869c00322a3e1ce0103
SHA1 64acae7de94b75ef9e51f869c9a15b14c95736e9
SHA256 7a4e197f41f2ab4920190e693dcaef3016dafe327b4000225b5f814ed50ca1b0
SHA512 5a29c2ae07e49efe80c3dfe1d723f9e51f2dfd113112f98c732a10758479b404f869eb4db7579a888018478441ccd3ac59a8c8a0ef15361c1e7f2c5cbe3e5344

C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat

MD5 b774ae3fb1da087e1f83b4f7b2060e5a
SHA1 97eb9be49ac3af9c851c9e1e84e32bfd53e325a8
SHA256 adaf4a84b41e410b02e261cfd0fe7739d98647eab73c3badd32ac6e39f26351b
SHA512 f75d0f95f7306d26a12b414bfe37b97fbd37546cb3c6e403def7077329ddffb4b45d5c5f0ba0e7bb6d72851d2d691b0a85267beead42f7cbf2e8c3d45a3b4701

\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe

MD5 65115173fb1e7ac067de48d48409e2f5
SHA1 2b954abb70cbc51d71d241372c6f459d82b22bfe
SHA256 846789c651a77d10528f9bc3efc108381f1b99593cd38679b2343fcaf6b65dbc
SHA512 10ad98c289bcb7988431780a439b59ddb464d8644e4fd864fee19b72a253098e66a8ef070f00d69c46578b86077f451a593919ed48fadae39ed3a433f196026f

memory/2672-28-0x0000000000400000-0x00000000004DB000-memory.dmp

memory/1528-33-0x0000000000400000-0x00000000004DB000-memory.dmp

memory/2612-32-0x0000000000400000-0x00000000004DB000-memory.dmp

memory/1528-31-0x0000000000260000-0x0000000000261000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-22 22:35

Reported

2024-07-22 23:35

Platform

win10v2004-20240709-en

Max time kernel

150s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe"

Signatures

Darkcomet

trojan rat darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A

Modifies firewall policy service

evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Modifies security service

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Disables RegEdit via registry modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Disables Task Manager via registry modification

evasion

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1372 set thread context of 3144 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: 33 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: 34 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: 35 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: 36 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSecurityPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemtimePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeBackupPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeRestorePrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Internet Explorer\iexplore.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 556 wrote to memory of 1216 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 556 wrote to memory of 1216 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 556 wrote to memory of 1216 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 556 wrote to memory of 4888 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 556 wrote to memory of 4888 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 556 wrote to memory of 4888 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 556 wrote to memory of 1372 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
PID 556 wrote to memory of 1372 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
PID 556 wrote to memory of 1372 N/A C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe
PID 1216 wrote to memory of 2124 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 1216 wrote to memory of 2124 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 1216 wrote to memory of 2124 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 4888 wrote to memory of 1004 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 4888 wrote to memory of 1004 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 4888 wrote to memory of 1004 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\attrib.exe
PID 1372 wrote to memory of 3144 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 1372 wrote to memory of 3144 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 1372 wrote to memory of 3144 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 1372 wrote to memory of 3144 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe
PID 1372 wrote to memory of 3144 N/A C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe C:\Program Files (x86)\Internet Explorer\iexplore.exe

System policy modification

evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe N/A

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A
N/A N/A C:\Windows\SysWOW64\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\65115173fb1e7ac067de48d48409e2f5_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "

C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe

"C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe"

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

C:\Windows\SysWOW64\attrib.exe

attrib "C:\Users\Admin\AppData\Local\Temp" +s +h

C:\Program Files (x86)\Internet Explorer\iexplore.exe

"C:\Program Files (x86)\Internet Explorer\iexplore.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 192.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp
US 8.8.8.8:53 newsi123.no-ip.org udp

Files

memory/556-0-0x0000000002830000-0x0000000002831000-memory.dmp

C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe

MD5 65115173fb1e7ac067de48d48409e2f5
SHA1 2b954abb70cbc51d71d241372c6f459d82b22bfe
SHA256 846789c651a77d10528f9bc3efc108381f1b99593cd38679b2343fcaf6b65dbc
SHA512 10ad98c289bcb7988431780a439b59ddb464d8644e4fd864fee19b72a253098e66a8ef070f00d69c46578b86077f451a593919ed48fadae39ed3a433f196026f

memory/1372-22-0x00000000023E0000-0x00000000023E1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat

MD5 b774ae3fb1da087e1f83b4f7b2060e5a
SHA1 97eb9be49ac3af9c851c9e1e84e32bfd53e325a8
SHA256 adaf4a84b41e410b02e261cfd0fe7739d98647eab73c3badd32ac6e39f26351b
SHA512 f75d0f95f7306d26a12b414bfe37b97fbd37546cb3c6e403def7077329ddffb4b45d5c5f0ba0e7bb6d72851d2d691b0a85267beead42f7cbf2e8c3d45a3b4701

memory/556-20-0x0000000000400000-0x00000000004DB000-memory.dmp

memory/3144-23-0x0000000000400000-0x00000000004DB000-memory.dmp

memory/1372-24-0x0000000000400000-0x00000000004DB000-memory.dmp