General
-
Target
29e83185591ddaca9c4a69f03d658177_JaffaCakes118
-
Size
1.6MB
-
Sample
240707-l3h9faygql
-
MD5
29e83185591ddaca9c4a69f03d658177
-
SHA1
c1618cc383486637a318adaaa12c9760eb7e14b1
-
SHA256
fb7f5f1814dbf4782ec77c8ecf5b135c7b65a3a96c74851a6aa9392a3cd6bedc
-
SHA512
7178fabfa97b18914056a48d3e74c98aabdb580830e639ecf7033c99118bbdec7ad687e4bc02c28ea7218ba2d2c0adce29534134ce03368218c1d005f0662362
-
SSDEEP
24576:voaLBLoMBWjDWARABr9Zkyv4mkvEUYtQS6Os5ueI9AUgFO4xibgi8/81UWow8QAU:voavUOOM8EUYtZ6OYI9DaiQJWoQx
Static task
static1
Behavioral task
behavioral1
Sample
29e83185591ddaca9c4a69f03d658177_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
darkcomet
Guest16
cheeseman64.no-ip.org:1604
DC_MUTEX-M2LA0SQ
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
CtVmu4KfgZq1
-
install
true
-
offline_keylogger
true
-
password
soccer98
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
29e83185591ddaca9c4a69f03d658177_JaffaCakes118
-
Size
1.6MB
-
MD5
29e83185591ddaca9c4a69f03d658177
-
SHA1
c1618cc383486637a318adaaa12c9760eb7e14b1
-
SHA256
fb7f5f1814dbf4782ec77c8ecf5b135c7b65a3a96c74851a6aa9392a3cd6bedc
-
SHA512
7178fabfa97b18914056a48d3e74c98aabdb580830e639ecf7033c99118bbdec7ad687e4bc02c28ea7218ba2d2c0adce29534134ce03368218c1d005f0662362
-
SSDEEP
24576:voaLBLoMBWjDWARABr9Zkyv4mkvEUYtQS6Os5ueI9AUgFO4xibgi8/81UWow8QAU:voavUOOM8EUYtZ6OYI9DaiQJWoQx
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1