General
-
Target
0869a45dfb764a310b0c60c1a0c670b5_JaffaCakes118
-
Size
665KB
-
Sample
240620-whtjsazfjd
-
MD5
0869a45dfb764a310b0c60c1a0c670b5
-
SHA1
4295e431c62cfb804328f8346a5869cdfcefc4ef
-
SHA256
dc7aed44048b31cab605e96936140d6e1a7c37a41a746246a5b9a151a4b52ad1
-
SHA512
8893b448e7237ac7c88475dedc9a6f8b51e079e9633869dee918bc228e20ce0507039a780b12f8fdee06afac06ec370d988afb550d249b07b45136fadd1edbb2
-
SSDEEP
12288:UkKo7AIgi6RVRunviZkllJm5KQgukDtEgBSOYbQTv4G:30Igi6InqeJmfguoSF8Tv4G
Static task
static1
Behavioral task
behavioral1
Sample
0869a45dfb764a310b0c60c1a0c670b5_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0869a45dfb764a310b0c60c1a0c670b5_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
darkcomet
Guest16
medo1234.no-ip.biz:1604
DC_MUTEX-F54S21D
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
dpmtNrs88jNP
-
install
true
-
offline_keylogger
true
-
password
12345
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
0869a45dfb764a310b0c60c1a0c670b5_JaffaCakes118
-
Size
665KB
-
MD5
0869a45dfb764a310b0c60c1a0c670b5
-
SHA1
4295e431c62cfb804328f8346a5869cdfcefc4ef
-
SHA256
dc7aed44048b31cab605e96936140d6e1a7c37a41a746246a5b9a151a4b52ad1
-
SHA512
8893b448e7237ac7c88475dedc9a6f8b51e079e9633869dee918bc228e20ce0507039a780b12f8fdee06afac06ec370d988afb550d249b07b45136fadd1edbb2
-
SSDEEP
12288:UkKo7AIgi6RVRunviZkllJm5KQgukDtEgBSOYbQTv4G:30Igi6InqeJmfguoSF8Tv4G
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-