General

  • Target

    027b872ada1537135e1d2a912e5fcdc4_JaffaCakes118

  • Size

    902KB

  • Sample

    240622-q7b35szhmg

  • MD5

    027b872ada1537135e1d2a912e5fcdc4

  • SHA1

    13e0cb2b4c1ae9591b6150412efdf87f8e60a750

  • SHA256

    ccd8309e1c4134851e5c76e51176dc549e5dacabf91fc717d107d5cc2f8dec47

  • SHA512

    8a92a6fd36de800aba32fa7cd2494837922190159649284e33fbc5bba3896ef0bc6a9c171d671d23f4ef9c71f3324242d1515235fb49e67cc41f26f37a9371e4

  • SSDEEP

    12288:kB2p/lmwWd1IgRZQNeV7nWAaRcthey1UlCJizpILKq7b+tmZXBEMzWIE2dnEPjfM:k+NmwWs81aitUMJiILK4BEM62dnMWF

Malware Config

Targets

    • Target

      027b872ada1537135e1d2a912e5fcdc4_JaffaCakes118

    • Size

      902KB

    • MD5

      027b872ada1537135e1d2a912e5fcdc4

    • SHA1

      13e0cb2b4c1ae9591b6150412efdf87f8e60a750

    • SHA256

      ccd8309e1c4134851e5c76e51176dc549e5dacabf91fc717d107d5cc2f8dec47

    • SHA512

      8a92a6fd36de800aba32fa7cd2494837922190159649284e33fbc5bba3896ef0bc6a9c171d671d23f4ef9c71f3324242d1515235fb49e67cc41f26f37a9371e4

    • SSDEEP

      12288:kB2p/lmwWd1IgRZQNeV7nWAaRcthey1UlCJizpILKq7b+tmZXBEMzWIE2dnEPjfM:k+NmwWs81aitUMJiILK4BEM62dnMWF

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Winlogon Helper DLL

1
T1547.004

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Defense Evasion

Modify Registry

6
T1112

Impair Defenses

3
T1562

Disable or Modify Tools

2
T1562.001

Disable or Modify System Firewall

1
T1562.004

Discovery

Query Registry

4
T1012

System Information Discovery

5
T1082

Tasks