General
-
Target
1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118
-
Size
393KB
-
Sample
240702-exfg2ayhlk
-
MD5
1df9fece0dd4500c39dbe9544959a9b7
-
SHA1
5e3a78348a7c8227324e7c586c9f1705d9f1e042
-
SHA256
803c89efe08eb9dd7dc35bd886818e61ffa82762d75f63c9d2691dd66e703524
-
SHA512
0bce0589f10d9c76db128dd74d284fe9708f43099dd7a2827f108a82ac5116f906e4f5fb4c0892f9f00f9aa856dd6b478e9ffc7849e7a25b696aafcf9ca8a9a6
-
SSDEEP
6144:NcfcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37jNkb/XM3jxNxW0Y0zlVYFAbQ:NcfcW7KEZlPzCy37jNW/XgxNXli3
Static task
static1
Behavioral task
behavioral1
Sample
1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118.exe
Resource
win7-20240611-en
Malware Config
Extracted
darkcomet
Guest16
romanticboy.zapto.org:1604
DC_MUTEX-DJQBFWY
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
lG6FsTBjX2NM
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Extracted
latentbot
romanticboy.zapto.org
Targets
-
-
Target
1df9fece0dd4500c39dbe9544959a9b7_JaffaCakes118
-
Size
393KB
-
MD5
1df9fece0dd4500c39dbe9544959a9b7
-
SHA1
5e3a78348a7c8227324e7c586c9f1705d9f1e042
-
SHA256
803c89efe08eb9dd7dc35bd886818e61ffa82762d75f63c9d2691dd66e703524
-
SHA512
0bce0589f10d9c76db128dd74d284fe9708f43099dd7a2827f108a82ac5116f906e4f5fb4c0892f9f00f9aa856dd6b478e9ffc7849e7a25b696aafcf9ca8a9a6
-
SSDEEP
6144:NcfcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37jNkb/XM3jxNxW0Y0zlVYFAbQ:NcfcW7KEZlPzCy37jNW/XgxNXli3
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1