General
-
Target
a70c493bfaba996e100dd35ed6c18951_JaffaCakes118
-
Size
259KB
-
Sample
240613-26rmzsvcjg
-
MD5
a70c493bfaba996e100dd35ed6c18951
-
SHA1
b1c184099805e83258e77b30806687beb0aa09c5
-
SHA256
a49018ba9474e20f883533f245790d7b51f5477f268f5cd189cb543e7e458bcd
-
SHA512
04b163c43c7588944edcfe56e9dd0b2f9ec72db4896f284e5987a187f3f2e9fa0a896d44564baa6e4a2c4add83a48f7bf26c0b8acff3a5363d5f789bbe6a10e6
-
SSDEEP
6144:0cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37+r:0cW7KEZlPzCy37
Behavioral task
behavioral1
Sample
a70c493bfaba996e100dd35ed6c18951_JaffaCakes118.exe
Resource
win7-20240611-en
Malware Config
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Extracted
darkcomet
ZQW
http://aliq.no-ip.info:1604
http://aliq.no-ip.info:1605
http://aliq.no-ip.info:2147
http://aliq.no-ip.info:4569
aliq.no-ip.info:1604
aliq.no-ip.info:1605
aliq.no-ip.info:2147
aliq.no-ip.info:4569
http://aliq111.no-ip.info:1604
http://aliq111.no-ip.info:1605
http://aliq111.no-ip.info:2147
http://aliq111.no-ip.info:4569
http://aliq555.publicvm.com:1604
http://aliq555.publicvm.com:2147
http://aliq555.publicvm.com:1605
http://aliq555.publicvm.com:4569
aliq555.publicvm.com:1604
aliq555.publicvm.com:1605
aliq555.publicvm.com:2147
aliq555.publicvm.com:4569
DC_MUTEX-BM2VJFH
-
InstallPath
C:\MSDCSC\ZQWZ.exe
-
gencode
N7GilaH4YpEz
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
ZQWZ
Targets
-
-
Target
a70c493bfaba996e100dd35ed6c18951_JaffaCakes118
-
Size
259KB
-
MD5
a70c493bfaba996e100dd35ed6c18951
-
SHA1
b1c184099805e83258e77b30806687beb0aa09c5
-
SHA256
a49018ba9474e20f883533f245790d7b51f5477f268f5cd189cb543e7e458bcd
-
SHA512
04b163c43c7588944edcfe56e9dd0b2f9ec72db4896f284e5987a187f3f2e9fa0a896d44564baa6e4a2c4add83a48f7bf26c0b8acff3a5363d5f789bbe6a10e6
-
SSDEEP
6144:0cNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37+r:0cW7KEZlPzCy37
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1