General
-
Target
32a226964a6a43441fd83f40763aae4f_JaffaCakes118
-
Size
747KB
-
Sample
240511-en5essfa68
-
MD5
32a226964a6a43441fd83f40763aae4f
-
SHA1
5f796aab7bd7aef0d0ed3f08a1547731799ec7ce
-
SHA256
6501e1df2ca602be36aa6b615069264b89135d831a2e46a48796b8d71e4e993b
-
SHA512
e1ebc51808a02261282926c9c91727a6b5425a049ec28280eaaea7809d4cf4065cd80c133db144c9ca683d90c8be7dde1421232defc86a5a3fda6a3539c687c5
-
SSDEEP
12288:vk0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/R/FFIIhII/:c0QRWoJEfg0oChGdJQbjPbNW5tYeP+GL
Behavioral task
behavioral1
Sample
32a226964a6a43441fd83f40763aae4f_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
darkcomet
Guest16
192.168.2.103:1604
DC_MUTEX-C505M8T
-
InstallPath
MSDCSC\win2010.exe
-
gencode
EdF7vuWm2khN
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
win2010
Targets
-
-
Target
32a226964a6a43441fd83f40763aae4f_JaffaCakes118
-
Size
747KB
-
MD5
32a226964a6a43441fd83f40763aae4f
-
SHA1
5f796aab7bd7aef0d0ed3f08a1547731799ec7ce
-
SHA256
6501e1df2ca602be36aa6b615069264b89135d831a2e46a48796b8d71e4e993b
-
SHA512
e1ebc51808a02261282926c9c91727a6b5425a049ec28280eaaea7809d4cf4065cd80c133db144c9ca683d90c8be7dde1421232defc86a5a3fda6a3539c687c5
-
SSDEEP
12288:vk0QVlhmPojAPTMEsUTg0oChO/Q2JbsbjPbN5qhRTtYe3f+Iw86k/R/FFIIhII/:c0QRWoJEfg0oChGdJQbjPbNW5tYeP+GL
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2