Malware Analysis Report

2025-04-13 22:44

Sample ID 250228-dvr8dazpy4
Target JaffaCakes118_31412729528ff5bc80c5582bbe784628
SHA256 1e1fe04cd20a5b8b47be1188c98ce2979b4c56257967f3bff3218a194b9d5efb
Tags
darkcomet guest16 defense_evasion discovery persistence rat trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1e1fe04cd20a5b8b47be1188c98ce2979b4c56257967f3bff3218a194b9d5efb

Threat Level: Known bad

The file JaffaCakes118_31412729528ff5bc80c5582bbe784628 was found to be: Known bad.

Malicious Activity Summary

darkcomet guest16 defense_evasion discovery persistence rat trojan upx

Darkcomet family

Darkcomet

Windows security bypass

Modifies firewall policy service

Modifies WinLogon for persistence

Checks computer location settings

Checks BIOS information in registry

Windows security modification

Executes dropped EXE

Adds Run key to start application

Suspicious use of SetThreadContext

Drops file in System32 directory

UPX packed file

Unsigned PE

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Modifies registry class

Checks processor information in registry

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Enumerates system info in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-02-28 03:20

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-28 03:20

Reported

2025-02-28 03:22

Platform

win7-20241010-en

Max time kernel

150s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe"

Signatures

Darkcomet

trojan rat darkcomet

Darkcomet family

darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\driver\\winupdate.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A

Modifies firewall policy service

defense_evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "1" C:\driver\winupdate.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" C:\driver\winupdate.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\driver\winupdate.exe N/A

Windows security bypass

defense_evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\driver\winupdate.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate C:\driver\winupdate.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\driver\winupdate.exe N/A
N/A N/A C:\driver\winupdate.exe N/A
N/A N/A C:\driver\winupdate.exe N/A

Windows security modification

defense_evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\driver\winupdate.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\driver\\winupdate.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\driver\winupdate.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\driver\winupdate.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\driver\winupdate.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C:\driver\winupdate.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier C:\driver\winupdate.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\driver\winupdate.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\driver\winupdate.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\driver\winupdate.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeSecurityPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeLoadDriverPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeSystemProfilePrivilege N/A C:\driver\winupdate.exe N/A
Token: SeSystemtimePrivilege N/A C:\driver\winupdate.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\driver\winupdate.exe N/A
Token: SeBackupPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeRestorePrivilege N/A C:\driver\winupdate.exe N/A
Token: SeShutdownPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeDebugPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeUndockPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeManageVolumePrivilege N/A C:\driver\winupdate.exe N/A
Token: SeImpersonatePrivilege N/A C:\driver\winupdate.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\driver\winupdate.exe N/A
Token: 33 N/A C:\driver\winupdate.exe N/A
Token: 34 N/A C:\driver\winupdate.exe N/A
Token: 35 N/A C:\driver\winupdate.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2308 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 2308 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 2308 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 2308 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 2308 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 2308 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 2308 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 2308 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 2308 wrote to memory of 2196 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 2196 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 2196 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 2196 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 2196 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 2196 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 2196 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 2196 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 2196 wrote to memory of 2864 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 2864 wrote to memory of 2812 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Windows\SysWOW64\explorer.exe
PID 2864 wrote to memory of 2812 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Windows\SysWOW64\explorer.exe
PID 2864 wrote to memory of 2812 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Windows\SysWOW64\explorer.exe
PID 2864 wrote to memory of 2812 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Windows\SysWOW64\explorer.exe
PID 2864 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\driver\winupdate.exe
PID 2864 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\driver\winupdate.exe
PID 2864 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\driver\winupdate.exe
PID 2864 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\driver\winupdate.exe
PID 2864 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\driver\winupdate.exe
PID 2864 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\driver\winupdate.exe
PID 2864 wrote to memory of 2700 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\driver\winupdate.exe
PID 2700 wrote to memory of 2032 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2700 wrote to memory of 2032 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2700 wrote to memory of 2032 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2700 wrote to memory of 2032 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2700 wrote to memory of 2032 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2700 wrote to memory of 2032 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2700 wrote to memory of 2032 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2700 wrote to memory of 2032 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2700 wrote to memory of 2032 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2700 wrote to memory of 2032 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2700 wrote to memory of 2032 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2700 wrote to memory of 2032 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2032 wrote to memory of 2972 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2032 wrote to memory of 2972 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2032 wrote to memory of 2972 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2032 wrote to memory of 2972 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2032 wrote to memory of 2972 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2032 wrote to memory of 2972 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2032 wrote to memory of 2972 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2032 wrote to memory of 2972 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2032 wrote to memory of 2972 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2032 wrote to memory of 2972 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2032 wrote to memory of 2972 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe

Processes

C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe

"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe"

C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe

C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe

C:\Windows\SysWOW64\explorer.exe

"C:\Windows\SysWOW64\explorer.exe"

C:\driver\winupdate.exe

"C:\driver\winupdate.exe"

C:\driver\winupdate.exe

C:\driver\winupdate.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 fugitif.no-ip.org udp

Files

memory/2308-0-0x0000000000400000-0x000000000040C000-memory.dmp

memory/2308-3-0x0000000000400000-0x000000000040C000-memory.dmp

memory/2196-4-0x0000000000400000-0x000000000040A000-memory.dmp

memory/2308-6-0x0000000000400000-0x000000000040C000-memory.dmp

memory/2196-7-0x0000000000400000-0x000000000040A000-memory.dmp

memory/2864-11-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2864-19-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2864-20-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2864-18-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2196-23-0x0000000000400000-0x000000000040A000-memory.dmp

memory/2864-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2864-14-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2864-12-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2864-24-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2864-27-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2864-25-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2864-26-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2864-29-0x0000000000400000-0x00000000004B5000-memory.dmp

C:\driver\winupdate.exe

MD5 31412729528ff5bc80c5582bbe784628
SHA1 26bc7dc6a6d763a96925f41f34d78ca6157ee4fc
SHA256 1e1fe04cd20a5b8b47be1188c98ce2979b4c56257967f3bff3218a194b9d5efb
SHA512 3628cc231e19dfaa66466d17b02db07967cad08068a57e002c4bd070490232d2450848ac0d2fa900553f108abc8ef0691c11b2109b5034ba21014790e072847b

memory/2864-35-0x00000000039D0000-0x00000000039DC000-memory.dmp

memory/2700-43-0x0000000000400000-0x000000000040C000-memory.dmp

memory/2864-42-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2700-44-0x0000000000020000-0x000000000002C000-memory.dmp

memory/2700-45-0x0000000000020000-0x000000000002C000-memory.dmp

memory/2700-49-0x0000000000020000-0x000000000002C000-memory.dmp

memory/2700-48-0x0000000000400000-0x000000000040C000-memory.dmp

memory/2700-50-0x0000000000020000-0x000000000002C000-memory.dmp

memory/2700-51-0x0000000000020000-0x000000000002C000-memory.dmp

memory/2032-56-0x0000000000020000-0x000000000002C000-memory.dmp

memory/2700-54-0x0000000000400000-0x000000000040C000-memory.dmp

memory/2972-70-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-72-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-74-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-73-0x0000000000020000-0x000000000002C000-memory.dmp

memory/2972-71-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2032-68-0x0000000000400000-0x000000000040A000-memory.dmp

memory/2972-65-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2972-75-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-78-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-79-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-77-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-76-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-81-0x0000000000020000-0x000000000002C000-memory.dmp

memory/2972-80-0x0000000000020000-0x000000000002C000-memory.dmp

memory/2972-82-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-83-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-84-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-85-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-86-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-87-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-88-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-89-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-90-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-91-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2972-92-0x0000000000400000-0x00000000004B5000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2025-02-28 03:20

Reported

2025-02-28 03:22

Platform

win10v2004-20250217-en

Max time kernel

150s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe"

Signatures

Darkcomet

trojan rat darkcomet

Darkcomet family

darkcomet

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\driver\\winupdate.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A

Modifies firewall policy service

defense_evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\driver\winupdate.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "1" C:\driver\winupdate.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" C:\driver\winupdate.exe N/A

Windows security bypass

defense_evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\driver\winupdate.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate C:\driver\winupdate.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\driver\winupdate.exe N/A
N/A N/A C:\driver\winupdate.exe N/A
N/A N/A C:\driver\winupdate.exe N/A

Windows security modification

defense_evasion trojan
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\driver\winupdate.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\driver\\winupdate.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\explorer.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\driver\winupdate.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\driver\winupdate.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\driver\winupdate.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier C:\driver\winupdate.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C:\driver\winupdate.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\driver\winupdate.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\driver\winupdate.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\driver\winupdate.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: 36 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeSecurityPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeLoadDriverPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeSystemProfilePrivilege N/A C:\driver\winupdate.exe N/A
Token: SeSystemtimePrivilege N/A C:\driver\winupdate.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\driver\winupdate.exe N/A
Token: SeBackupPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeRestorePrivilege N/A C:\driver\winupdate.exe N/A
Token: SeShutdownPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeDebugPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeUndockPrivilege N/A C:\driver\winupdate.exe N/A
Token: SeManageVolumePrivilege N/A C:\driver\winupdate.exe N/A
Token: SeImpersonatePrivilege N/A C:\driver\winupdate.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\driver\winupdate.exe N/A
Token: 33 N/A C:\driver\winupdate.exe N/A
Token: 34 N/A C:\driver\winupdate.exe N/A
Token: 35 N/A C:\driver\winupdate.exe N/A
Token: 36 N/A C:\driver\winupdate.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 216 wrote to memory of 1892 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 216 wrote to memory of 1892 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 216 wrote to memory of 1892 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 216 wrote to memory of 1892 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 216 wrote to memory of 1892 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 216 wrote to memory of 1892 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 216 wrote to memory of 1892 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 216 wrote to memory of 1892 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 1892 wrote to memory of 4624 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 1892 wrote to memory of 4624 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 1892 wrote to memory of 4624 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 1892 wrote to memory of 4624 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 1892 wrote to memory of 4624 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 1892 wrote to memory of 4624 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 1892 wrote to memory of 4624 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 1892 wrote to memory of 4624 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe
PID 4624 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Windows\SysWOW64\explorer.exe
PID 4624 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Windows\SysWOW64\explorer.exe
PID 4624 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Windows\SysWOW64\explorer.exe
PID 4624 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Windows\SysWOW64\explorer.exe
PID 4624 wrote to memory of 1376 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\Windows\SysWOW64\explorer.exe
PID 4624 wrote to memory of 3144 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\driver\winupdate.exe
PID 4624 wrote to memory of 3144 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\driver\winupdate.exe
PID 4624 wrote to memory of 3144 N/A C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe C:\driver\winupdate.exe
PID 3144 wrote to memory of 2544 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 3144 wrote to memory of 2544 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 3144 wrote to memory of 2544 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 3144 wrote to memory of 2544 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 3144 wrote to memory of 2544 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 3144 wrote to memory of 2544 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 3144 wrote to memory of 2544 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 3144 wrote to memory of 2544 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2544 wrote to memory of 4076 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2544 wrote to memory of 4076 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2544 wrote to memory of 4076 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2544 wrote to memory of 4076 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2544 wrote to memory of 4076 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2544 wrote to memory of 4076 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2544 wrote to memory of 4076 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe
PID 2544 wrote to memory of 4076 N/A C:\driver\winupdate.exe C:\driver\winupdate.exe

Processes

C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe

"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe"

C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe

C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_31412729528ff5bc80c5582bbe784628.exe

C:\Windows\SysWOW64\explorer.exe

"C:\Windows\SysWOW64\explorer.exe"

C:\driver\winupdate.exe

"C:\driver\winupdate.exe"

C:\driver\winupdate.exe

C:\driver\winupdate.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp
US 8.8.8.8:53 fugitif.no-ip.org udp

Files

memory/216-0-0x0000000000400000-0x000000000040C000-memory.dmp

memory/1892-3-0x0000000000400000-0x000000000040A000-memory.dmp

memory/1892-5-0x0000000000400000-0x000000000040A000-memory.dmp

memory/216-6-0x0000000000400000-0x000000000040C000-memory.dmp

memory/4624-9-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4624-11-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/1892-12-0x0000000000400000-0x000000000040A000-memory.dmp

memory/4624-14-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4624-16-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4624-15-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4624-17-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4624-18-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/1376-22-0x0000000000400000-0x000000000040C000-memory.dmp

memory/1376-24-0x0000000000400000-0x000000000040C000-memory.dmp

C:\driver\winupdate.exe

MD5 31412729528ff5bc80c5582bbe784628
SHA1 26bc7dc6a6d763a96925f41f34d78ca6157ee4fc
SHA256 1e1fe04cd20a5b8b47be1188c98ce2979b4c56257967f3bff3218a194b9d5efb
SHA512 3628cc231e19dfaa66466d17b02db07967cad08068a57e002c4bd070490232d2450848ac0d2fa900553f108abc8ef0691c11b2109b5034ba21014790e072847b

memory/4624-83-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/1376-90-0x0000000000400000-0x000000000040C000-memory.dmp

memory/3144-91-0x0000000000400000-0x000000000040C000-memory.dmp

memory/2544-94-0x0000000000400000-0x000000000040A000-memory.dmp

memory/3144-97-0x0000000000400000-0x000000000040C000-memory.dmp

memory/4076-102-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-101-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-100-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-103-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/2544-108-0x0000000000400000-0x000000000040A000-memory.dmp

memory/4076-107-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-106-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-105-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-104-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-111-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-110-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-112-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-113-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-114-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-115-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-116-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-117-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-118-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-119-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-120-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-121-0x0000000000400000-0x00000000004B5000-memory.dmp

memory/4076-122-0x0000000000400000-0x00000000004B5000-memory.dmp