General
-
Target
29769fb8ce633cf490abd3f788c93a8b_JaffaCakes118
-
Size
386KB
-
Sample
240706-2mgzfaxekf
-
MD5
29769fb8ce633cf490abd3f788c93a8b
-
SHA1
91b9d4a974c77326d34b31d6a73521c5d860445d
-
SHA256
54494eb82d869f9540fd6ed27d40aecd7d978a3e8f70b0888a1f5bb76bc4b1d7
-
SHA512
fc34ef1d57dbd73bf858458c304d7f9925a736e9183be51c1de543b3e6dc5ba12efea4d42e3b268cb7921a66ecf60ee4fa988178fac62208a8485cdafe4ed2c7
-
SSDEEP
12288:u0dlQfgMfzqszGL8dFPgTcCdK48aqRCWAvw:JnkgIyLAgTcCt81wf
Behavioral task
behavioral1
Sample
29769fb8ce633cf490abd3f788c93a8b_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
darkcomet
Guest16
microsoft-helper.servehttp.com:1918
DC_MUTEX-KUDHJFE
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
s3bAr0avzdCL
-
install
true
-
offline_keylogger
true
-
password
SamI
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
29769fb8ce633cf490abd3f788c93a8b_JaffaCakes118
-
Size
386KB
-
MD5
29769fb8ce633cf490abd3f788c93a8b
-
SHA1
91b9d4a974c77326d34b31d6a73521c5d860445d
-
SHA256
54494eb82d869f9540fd6ed27d40aecd7d978a3e8f70b0888a1f5bb76bc4b1d7
-
SHA512
fc34ef1d57dbd73bf858458c304d7f9925a736e9183be51c1de543b3e6dc5ba12efea4d42e3b268cb7921a66ecf60ee4fa988178fac62208a8485cdafe4ed2c7
-
SSDEEP
12288:u0dlQfgMfzqszGL8dFPgTcCdK48aqRCWAvw:JnkgIyLAgTcCt81wf
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1