General
-
Target
0cc56492ec83cf86a8c900202275fa7a_JaffaCakes118
-
Size
901KB
-
Sample
240621-s3dghswdmh
-
MD5
0cc56492ec83cf86a8c900202275fa7a
-
SHA1
1a044e1b11cffb86fa07c90186f45aa4012b7552
-
SHA256
5ba5df1b2731469a1bd88dbbc02bfd7b5ba45c728fba7909d92479399e84b6e3
-
SHA512
5c3e49d0b9c5cb822b65e165b434753464c48b6afc3b8ff49af3e0eb4d1351dfcb78b32b101a1828441c91546706d37bc0c068a21d3c741b2e34bc9128888f5d
-
SSDEEP
24576:KkPhNKltuiMI2tU7sfunBZZSiEavQHqwBJpZaOsqFj:lPmPuqh7mIcqwBAUj
Static task
static1
Behavioral task
behavioral1
Sample
0cc56492ec83cf86a8c900202275fa7a_JaffaCakes118.exe
Resource
win7-20240611-en
Malware Config
Extracted
darkcomet
001
arthas7891.no-ip.biz:5000
DC_MUTEX-ATUVQRQ
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
gTYUJfA7rsGT
-
install
true
-
offline_keylogger
true
-
password
77889911
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
0cc56492ec83cf86a8c900202275fa7a_JaffaCakes118
-
Size
901KB
-
MD5
0cc56492ec83cf86a8c900202275fa7a
-
SHA1
1a044e1b11cffb86fa07c90186f45aa4012b7552
-
SHA256
5ba5df1b2731469a1bd88dbbc02bfd7b5ba45c728fba7909d92479399e84b6e3
-
SHA512
5c3e49d0b9c5cb822b65e165b434753464c48b6afc3b8ff49af3e0eb4d1351dfcb78b32b101a1828441c91546706d37bc0c068a21d3c741b2e34bc9128888f5d
-
SSDEEP
24576:KkPhNKltuiMI2tU7sfunBZZSiEavQHqwBJpZaOsqFj:lPmPuqh7mIcqwBAUj
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1