Malware Analysis Report

2025-04-13 22:43

Sample ID 250228-d8r5ja1kv6
Target JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba
SHA256 de2f0931ac8324a64e41caf6ba7cc63e46cb30853725194668aed67bd4eaff23
Tags
darkcomet guest16 discovery persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

de2f0931ac8324a64e41caf6ba7cc63e46cb30853725194668aed67bd4eaff23

Threat Level: Known bad

The file JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba was found to be: Known bad.

Malicious Activity Summary

darkcomet guest16 discovery persistence rat trojan

Darkcomet family

Modifies WinLogon for persistence

Darkcomet

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Adds Run key to start application

Suspicious use of SetThreadContext

Unsigned PE

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Modifies registry class

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-02-28 03:41

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-28 03:41

Reported

2025-02-28 03:43

Platform

win7-20240729-en

Max time kernel

149s

Max time network

16s

Command Line

"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe"

Signatures

Darkcomet

trojan rat darkcomet

Darkcomet family

darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 33 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 34 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 35 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2216 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 2216 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 2216 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 2216 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 2216 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 2216 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 2216 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 2216 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 2216 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 2216 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 2216 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 2216 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 2216 wrote to memory of 1992 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 1992 wrote to memory of 2280 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1992 wrote to memory of 2280 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1992 wrote to memory of 2280 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1992 wrote to memory of 2280 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2280 wrote to memory of 1916 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2280 wrote to memory of 1916 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2280 wrote to memory of 1916 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2280 wrote to memory of 1916 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2280 wrote to memory of 1916 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2280 wrote to memory of 1916 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2280 wrote to memory of 1916 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2280 wrote to memory of 1916 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2280 wrote to memory of 1916 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2280 wrote to memory of 1916 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2280 wrote to memory of 1916 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2280 wrote to memory of 1916 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 2280 wrote to memory of 1916 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

Processes

C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe

"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe"

C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe

"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe"

C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"

C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"

Network

Country Destination Domain Proto
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp

Files

memory/2216-0-0x0000000000400000-0x000000000040C000-memory.dmp

memory/1992-5-0x0000000000400000-0x0000000000500000-memory.dmp

memory/1992-15-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/1992-17-0x0000000000400000-0x0000000000500000-memory.dmp

memory/2216-20-0x0000000000400000-0x000000000040C000-memory.dmp

memory/1992-19-0x0000000000400000-0x0000000000500000-memory.dmp

memory/1992-14-0x0000000000400000-0x0000000000500000-memory.dmp

memory/1992-13-0x0000000000400000-0x0000000000500000-memory.dmp

memory/1992-12-0x0000000000400000-0x0000000000500000-memory.dmp

memory/1992-11-0x0000000000400000-0x0000000000500000-memory.dmp

memory/1992-10-0x0000000000400000-0x0000000000500000-memory.dmp

memory/1992-9-0x0000000000400000-0x0000000000500000-memory.dmp

memory/1992-7-0x0000000000400000-0x0000000000500000-memory.dmp

memory/1992-22-0x0000000000400000-0x0000000000500000-memory.dmp

memory/1992-21-0x0000000000400000-0x0000000000500000-memory.dmp

memory/1992-23-0x0000000000400000-0x00000000004B2000-memory.dmp

C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

MD5 315aca4b6d1a204e78df914bf7e588ba
SHA1 5211436ba2464ab3482aef7bc921f26246b1182c
SHA256 de2f0931ac8324a64e41caf6ba7cc63e46cb30853725194668aed67bd4eaff23
SHA512 769c263bed2c7df8ebbdcf8d312290c645859454437ab6a9aa24a07836dc1ac6dc45d74238664f479bb115b28d327113cbe8fa705d5c28b6be452c9f984fa92b

memory/1992-33-0x0000000004090000-0x000000000409C000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2703099537-420551529-3771253338-1000\88603cb2913a7df3fbd16b5f958e6447_4b15cc6c-8bd6-4727-90f6-cf303c4bde6d

MD5 5fc2ac2a310f49c14d195230b91a8885
SHA1 90855cc11136ba31758fe33b5cf9571f9a104879
SHA256 374e0e2897a7a82e0e44794cad89df0f3cdd7703886239c1fe06d625efd48092
SHA512 ab46554df9174b9fe9beba50a640f67534c3812f64d96a1fb8adfdc136dfe730ca2370825cd45b7f87a544d6a58dd868cb5a3a7f42e2789f6d679dbc0fdd52c3

memory/1916-57-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/1916-59-0x0000000000400000-0x0000000000500000-memory.dmp

memory/1916-58-0x0000000000400000-0x0000000000500000-memory.dmp

memory/2280-55-0x0000000000400000-0x000000000040C000-memory.dmp

memory/1992-61-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/1992-60-0x0000000000400000-0x0000000000500000-memory.dmp

memory/1916-62-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/1916-63-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/1916-65-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/1916-68-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/1916-72-0x0000000000400000-0x00000000004B2000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2025-02-28 03:41

Reported

2025-02-28 03:43

Platform

win10v2004-20250217-en

Max time kernel

148s

Max time network

144s

Command Line

"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe"

Signatures

Darkcomet

trojan rat darkcomet

Darkcomet family

darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 33 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 34 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 35 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A
Token: 36 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe N/A
N/A N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1744 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 1744 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 1744 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 1744 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 1744 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 1744 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 1744 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 1744 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 1744 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 1744 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 1744 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 1744 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 1744 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 1744 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe
PID 3920 wrote to memory of 1928 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 3920 wrote to memory of 1928 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 3920 wrote to memory of 1928 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1928 wrote to memory of 436 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1928 wrote to memory of 436 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1928 wrote to memory of 436 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1928 wrote to memory of 436 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1928 wrote to memory of 436 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1928 wrote to memory of 436 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1928 wrote to memory of 436 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1928 wrote to memory of 436 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1928 wrote to memory of 436 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1928 wrote to memory of 436 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1928 wrote to memory of 436 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1928 wrote to memory of 436 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1928 wrote to memory of 436 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe
PID 1928 wrote to memory of 436 N/A C:\Users\Admin\Documents\MSDCSC\msdcsc.exe C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

Processes

C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe

"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe"

C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe

"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_315aca4b6d1a204e78df914bf7e588ba.exe"

C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"

C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp
N/A 127.0.0.1:1604 tcp

Files

memory/1744-0-0x0000000000400000-0x000000000040C000-memory.dmp

memory/3920-6-0x0000000000400000-0x0000000000500000-memory.dmp

memory/3920-5-0x0000000000400000-0x0000000000500000-memory.dmp

memory/3920-7-0x0000000000400000-0x0000000000500000-memory.dmp

memory/1744-8-0x0000000000400000-0x000000000040C000-memory.dmp

memory/3920-9-0x00000000022C0000-0x00000000022C1000-memory.dmp

C:\Users\Admin\Documents\MSDCSC\msdcsc.exe

MD5 315aca4b6d1a204e78df914bf7e588ba
SHA1 5211436ba2464ab3482aef7bc921f26246b1182c
SHA256 de2f0931ac8324a64e41caf6ba7cc63e46cb30853725194668aed67bd4eaff23
SHA512 769c263bed2c7df8ebbdcf8d312290c645859454437ab6a9aa24a07836dc1ac6dc45d74238664f479bb115b28d327113cbe8fa705d5c28b6be452c9f984fa92b

C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-925314154-1797147466-1467878628-1000\88603cb2913a7df3fbd16b5f958e6447_87aefc90-3d2c-45c7-bd08-29a9b6ee7114

MD5 5fc2ac2a310f49c14d195230b91a8885
SHA1 90855cc11136ba31758fe33b5cf9571f9a104879
SHA256 374e0e2897a7a82e0e44794cad89df0f3cdd7703886239c1fe06d625efd48092
SHA512 ab46554df9174b9fe9beba50a640f67534c3812f64d96a1fb8adfdc136dfe730ca2370825cd45b7f87a544d6a58dd868cb5a3a7f42e2789f6d679dbc0fdd52c3

memory/1928-78-0x0000000000400000-0x000000000040C000-memory.dmp

memory/436-79-0x00000000020B0000-0x00000000020B1000-memory.dmp

memory/436-81-0x0000000000400000-0x0000000000500000-memory.dmp

memory/436-80-0x0000000000400000-0x0000000000500000-memory.dmp

memory/3920-82-0x0000000000400000-0x0000000000500000-memory.dmp

memory/3920-83-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/436-84-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/436-86-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/436-88-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/436-89-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/436-90-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/436-91-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/436-92-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/436-94-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/436-96-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/436-97-0x0000000000400000-0x00000000004B2000-memory.dmp