Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 16:20
Behavioral task
behavioral1
Sample
c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe
-
Size
1024KB
-
MD5
c35e0f090da7e3fe6a7a0d4884210b13
-
SHA1
93d07c8517d9d36782ee82f3bdb5dd106d39388e
-
SHA256
f759238bc33a19a0f4c5b27eb8628a57698c3b7b08a9cc07510c579a5fbffed3
-
SHA512
8e3b538486636e99b2ba40d051ed1fa5977f2867657635bd6718b97b8a6bdc304ed16d1bbad0fef7a8e1555dd5d199161e64f78fe9961e7298abb80552586704
-
SSDEEP
24576:1Z1xuVVjfFoynPaVBUR8f+kN10EBhSTyLE58JKtYA+u:PQDgok30ESTyLEGK9+u
Malware Config
Extracted
darkcomet
Guest16
sabahhassan.no-ip.biz:1604
DC_MUTEX-MHPA3BK
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
MAYkZ7Pow4iS
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" iexplore.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" iexplore.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msdcsc.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" iexplore.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2320 attrib.exe 2684 attrib.exe -
Deletes itself 1 IoCs
pid Process 2756 notepad.exe -
Executes dropped EXE 7 IoCs
pid Process 2520 8BALLRULER+1.1+(WIN).EXE 2860 Install 8BallRuler.exe 980 msdcsc.exe 1512 8BALLRULER+1.1+(WIN).EXE 1664 Install 8BallRuler.exe 276 8BALLRULER+1.1+(WIN).EXE 3012 Install 8BallRuler.exe -
Loads dropped DLL 17 IoCs
pid Process 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 2520 8BALLRULER+1.1+(WIN).EXE 2520 8BALLRULER+1.1+(WIN).EXE 2520 8BALLRULER+1.1+(WIN).EXE 2520 8BALLRULER+1.1+(WIN).EXE 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 980 msdcsc.exe 1512 8BALLRULER+1.1+(WIN).EXE 1512 8BALLRULER+1.1+(WIN).EXE 1512 8BALLRULER+1.1+(WIN).EXE 1512 8BALLRULER+1.1+(WIN).EXE 592 iexplore.exe 276 8BALLRULER+1.1+(WIN).EXE 276 8BALLRULER+1.1+(WIN).EXE 276 8BALLRULER+1.1+(WIN).EXE 276 8BALLRULER+1.1+(WIN).EXE -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" iexplore.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 980 set thread context of 592 980 msdcsc.exe 44 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install 8BallRuler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8BALLRULER+1.1+(WIN).EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8BALLRULER+1.1+(WIN).EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install 8BallRuler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install 8BallRuler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8BALLRULER+1.1+(WIN).EXE -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Install 8BallRuler.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Install 8BallRuler.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 592 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeSecurityPrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeSystemtimePrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeBackupPrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeRestorePrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeShutdownPrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeDebugPrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeUndockPrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeManageVolumePrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeImpersonatePrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: 33 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: 34 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: 35 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 980 msdcsc.exe Token: SeSecurityPrivilege 980 msdcsc.exe Token: SeTakeOwnershipPrivilege 980 msdcsc.exe Token: SeLoadDriverPrivilege 980 msdcsc.exe Token: SeSystemProfilePrivilege 980 msdcsc.exe Token: SeSystemtimePrivilege 980 msdcsc.exe Token: SeProfSingleProcessPrivilege 980 msdcsc.exe Token: SeIncBasePriorityPrivilege 980 msdcsc.exe Token: SeCreatePagefilePrivilege 980 msdcsc.exe Token: SeBackupPrivilege 980 msdcsc.exe Token: SeRestorePrivilege 980 msdcsc.exe Token: SeShutdownPrivilege 980 msdcsc.exe Token: SeDebugPrivilege 980 msdcsc.exe Token: SeSystemEnvironmentPrivilege 980 msdcsc.exe Token: SeChangeNotifyPrivilege 980 msdcsc.exe Token: SeRemoteShutdownPrivilege 980 msdcsc.exe Token: SeUndockPrivilege 980 msdcsc.exe Token: SeManageVolumePrivilege 980 msdcsc.exe Token: SeImpersonatePrivilege 980 msdcsc.exe Token: SeCreateGlobalPrivilege 980 msdcsc.exe Token: 33 980 msdcsc.exe Token: 34 980 msdcsc.exe Token: 35 980 msdcsc.exe Token: SeIncreaseQuotaPrivilege 592 iexplore.exe Token: SeSecurityPrivilege 592 iexplore.exe Token: SeTakeOwnershipPrivilege 592 iexplore.exe Token: SeLoadDriverPrivilege 592 iexplore.exe Token: SeSystemProfilePrivilege 592 iexplore.exe Token: SeSystemtimePrivilege 592 iexplore.exe Token: SeProfSingleProcessPrivilege 592 iexplore.exe Token: SeIncBasePriorityPrivilege 592 iexplore.exe Token: SeCreatePagefilePrivilege 592 iexplore.exe Token: SeBackupPrivilege 592 iexplore.exe Token: SeRestorePrivilege 592 iexplore.exe Token: SeShutdownPrivilege 592 iexplore.exe Token: SeDebugPrivilege 592 iexplore.exe Token: SeSystemEnvironmentPrivilege 592 iexplore.exe Token: SeChangeNotifyPrivilege 592 iexplore.exe Token: SeRemoteShutdownPrivilege 592 iexplore.exe Token: SeUndockPrivilege 592 iexplore.exe Token: SeManageVolumePrivilege 592 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 592 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1680 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 30 PID 2032 wrote to memory of 1680 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 30 PID 2032 wrote to memory of 1680 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 30 PID 2032 wrote to memory of 1680 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2384 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 31 PID 2032 wrote to memory of 2384 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 31 PID 2032 wrote to memory of 2384 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 31 PID 2032 wrote to memory of 2384 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 31 PID 2032 wrote to memory of 2520 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 34 PID 2032 wrote to memory of 2520 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 34 PID 2032 wrote to memory of 2520 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 34 PID 2032 wrote to memory of 2520 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 34 PID 2384 wrote to memory of 2320 2384 cmd.exe 35 PID 1680 wrote to memory of 2684 1680 cmd.exe 36 PID 1680 wrote to memory of 2684 1680 cmd.exe 36 PID 1680 wrote to memory of 2684 1680 cmd.exe 36 PID 1680 wrote to memory of 2684 1680 cmd.exe 36 PID 2384 wrote to memory of 2320 2384 cmd.exe 35 PID 2384 wrote to memory of 2320 2384 cmd.exe 35 PID 2384 wrote to memory of 2320 2384 cmd.exe 35 PID 2520 wrote to memory of 2860 2520 8BALLRULER+1.1+(WIN).EXE 37 PID 2520 wrote to memory of 2860 2520 8BALLRULER+1.1+(WIN).EXE 37 PID 2520 wrote to memory of 2860 2520 8BALLRULER+1.1+(WIN).EXE 37 PID 2520 wrote to memory of 2860 2520 8BALLRULER+1.1+(WIN).EXE 37 PID 2520 wrote to memory of 2860 2520 8BALLRULER+1.1+(WIN).EXE 37 PID 2520 wrote to memory of 2860 2520 8BALLRULER+1.1+(WIN).EXE 37 PID 2520 wrote to memory of 2860 2520 8BALLRULER+1.1+(WIN).EXE 37 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 2756 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 39 PID 2032 wrote to memory of 980 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 40 PID 2032 wrote to memory of 980 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 40 PID 2032 wrote to memory of 980 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 40 PID 2032 wrote to memory of 980 2032 c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe 40 PID 980 wrote to memory of 1512 980 msdcsc.exe 41 PID 980 wrote to memory of 1512 980 msdcsc.exe 41 PID 980 wrote to memory of 1512 980 msdcsc.exe 41 PID 980 wrote to memory of 1512 980 msdcsc.exe 41 PID 1512 wrote to memory of 1664 1512 8BALLRULER+1.1+(WIN).EXE 42 PID 1512 wrote to memory of 1664 1512 8BALLRULER+1.1+(WIN).EXE 42 PID 1512 wrote to memory of 1664 1512 8BALLRULER+1.1+(WIN).EXE 42 PID 1512 wrote to memory of 1664 1512 8BALLRULER+1.1+(WIN).EXE 42 PID 1512 wrote to memory of 1664 1512 8BALLRULER+1.1+(WIN).EXE 42 PID 1512 wrote to memory of 1664 1512 8BALLRULER+1.1+(WIN).EXE 42 PID 1512 wrote to memory of 1664 1512 8BALLRULER+1.1+(WIN).EXE 42 PID 980 wrote to memory of 592 980 msdcsc.exe 44 PID 980 wrote to memory of 592 980 msdcsc.exe 44 PID 980 wrote to memory of 592 980 msdcsc.exe 44 PID 980 wrote to memory of 592 980 msdcsc.exe 44 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2320 attrib.exe 2684 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2320
-
-
-
C:\Users\Admin\AppData\Local\Temp\8BALLRULER+1.1+(WIN).EXE"C:\Users\Admin\AppData\Local\Temp\8BALLRULER+1.1+(WIN).EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\AIR976F.tmp\Install 8BallRuler.exe"C:\Users\Admin\AppData\Local\Temp\AIR976F.tmp\Install 8BallRuler.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"2⤵
- Modifies firewall policy service
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\8BALLRULER+1.1+(WIN).EXE"C:\Users\Admin\AppData\Local\Temp\8BALLRULER+1.1+(WIN).EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\AIR9BB3.tmp\Install 8BallRuler.exe"C:\Users\Admin\AppData\Local\Temp\AIR9BB3.tmp\Install 8BallRuler.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:1664
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Modifies firewall policy service
- Windows security bypass
- Disables RegEdit via registry modification
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:592 -
C:\Users\Admin\AppData\Local\Temp\8BALLRULER+1.1+(WIN).EXE"C:\Users\Admin\AppData\Local\Temp\8BALLRULER+1.1+(WIN).EXE"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:276 -
C:\Users\Admin\AppData\Local\Temp\AIR9F2C.tmp\Install 8BallRuler.exe"C:\Users\Admin\AppData\Local\Temp\AIR9F2C.tmp\Install 8BallRuler.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3012
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad4⤵
- System Location Discovery: System Language Discovery
PID:1380
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD5df9404c4426254f0917526e175d75fef
SHA10d1c0a536e6532188c732eae289907651074ef82
SHA25611ec5b13d84a44ebb45b953e94364c3bfc01888a3c1ec114e1ba32373d9ee776
SHA51202a15a63fa173ac922ce360ac1dab571b45ff1ac207e8f05c06f8d69e3c7f3d43180fd3ed07435b522974c98aa3240a59d55282d8ae3e0facd57a1a2e75b9da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD550589d5b971a9058a44b424d695a461d
SHA10e9e2c05345bbae8a667a095cfc0b04548339318
SHA25692ad8b5bc0c151abbd677f51b10123c3bff34a6b00aeba87deec1da9083e0d7a
SHA512c63989527bad240f98d8e5193010b8d579013584f007f3630721357cfd03462c7e46b9aba24d7ec2045d36f525050603b7b3b50112179db7b26be9b33e9e8f16
-
Filesize
308B
MD5d0a9c676c162b8ecf80976e9e2f8fd82
SHA1649c5b3780855800a58aede17e83ae2e86018560
SHA2569f91fa61c6ae7caa79f94c00a59a58168ea7009181ec7f963d467544d8bdbca3
SHA5127567c7ed80f8179aaf9af91b731edb9941e5107571bf6c3d583b5859ac22f60f66f2408291a6e3845cc664a6f23159a58d06f6476eca77d4958e7cb5ec5e1765
-
Filesize
545B
MD510b79f363533644f1f82b17324e69c28
SHA1c3146a52310e8f3d22429820d471e322d106fd3e
SHA2563de45c0afce3c1fcfcf1fd98ecd10f00fa095ca2d2828336169a0856ed1b3126
SHA5127507e45f8c391ce7a44a769c089e27cd5163fe1b160df58ac897e862c953396bc6a20843a6b605b65361bc40dbe4cb5db24aa27480c1d00afef9b17ab8d92fe5
-
Filesize
866B
MD5aef1e8cb4cd916e8b77145e517d92b2c
SHA14d5be30bfd2bd951f9abbd95ca411f492f9bf3f7
SHA256bf19c87d3a2ee633d6e8800d47fe62c5a221b25971b6299ed020930a5e51893e
SHA512e164c6475993fc5176e5216d6651443444d366e82bd09ea9529c667141f5f568d4b976415cc269a2ee5b2d008ffc8d632a187fc5f0ca3d850dfd3cbabf038715
-
Filesize
1KB
MD55035a2e4b3e5dafff075ff8feb567598
SHA1d20abc449677c5ad7bce09d7c4301306edf8debe
SHA25635cd1c4932ab0c7484cb53e6087791d053771f6d644a6ff44eb96eb16d520a2e
SHA5125706c5fe5b64809d7de1be098721517cd688244b587cdc19858ad252197763f983cee573575262b481869bda0059e8f6963f14560f55a694c89cba7aebaf4b95
-
Filesize
1KB
MD52892eb7d16ced447b582c4df1faad63f
SHA1c55f73b0643c231b184f71cdbfd2ad441d11e091
SHA256aa99e3b861ec14eecbe5df3278170147762587a6864374b718cec0d13491bca7
SHA51219c33edb4b452e8fbe2c8847a3aae693a3c1a4f5067372a7cdc8920e7d634669e7b5c3459be1224222acecdf8a608448669f9890ed2dfc65796127b534e1b562
-
Filesize
1KB
MD5ca1d188fcbc1f97c454435883d43549b
SHA10f4bfbe3f8018730fa70bf6221d60f1b27597d1d
SHA256e3c19370495ab421153360caa445f9559b0462bf8cf24fb05115f7eb5a695abc
SHA51257a8ccc71a09e8e8320667a9fcc568a7e633612198a891543159f420c00e93bc631293e4a5d4367194f4a91fe19b02c74a668cb821e3949a168292f5914360d5
-
Filesize
363KB
MD54b0fe4b36e5ed0f224bf6f2108ba9e9e
SHA1948b52946060ad29c94b4e2d150e2a77bbee4c5e
SHA256bc09b11b3963f2ea59fce5bc783e5d2592bb888d037adba030b54bf2165281b8
SHA5121caf3f179c9de1c7de46cc3e9f8708b0549e1c57b1a63fce6fe11fb20037e58a4d51286b8cc72029a290f67152edb1886f6067c9c17da4af790d49eeae5e56e3
-
Filesize
22B
MD5030cf67122e16c6fb7a1d9712b2f3e25
SHA1b2944a75dc99b0859dd19d8b9204de467e2e0d56
SHA25668d6e0d1a7327895b8069ec31135744461a1586d0a5874d8e5eb882d3dcd0556
SHA5123246b49861325768f454db2c5ddb76439be4fa16a0a3a5f197905a3bf596c28fca839d0b203c5d40a60f18e489fee3bf86e03323580f3ff4064d74cf67635e0b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
125KB
MD55b6bc0f14712a4ccbf59fba43b7be42a
SHA1e953c7fcd227832294b7d7ca1a8fda53c5803597
SHA2562c685d483172df43fcfb3a23ed0decedbe4087d37248a78d4b475033eebe5ccb
SHA51222dbcd77b0756e6cd719fd50f3d8eee8394e858f154fe345c9339f9686d6af27316521437b6a74a82db965ad2ea6fadc6937b74d5c7a715f32a3009e5e7b0dac
-
Filesize
1024KB
MD5c35e0f090da7e3fe6a7a0d4884210b13
SHA193d07c8517d9d36782ee82f3bdb5dd106d39388e
SHA256f759238bc33a19a0f4c5b27eb8628a57698c3b7b08a9cc07510c579a5fbffed3
SHA5128e3b538486636e99b2ba40d051ed1fa5977f2867657635bd6718b97b8a6bdc304ed16d1bbad0fef7a8e1555dd5d199161e64f78fe9961e7298abb80552586704