General
-
Target
45c31a6657d85a83a327a9b907843e67_JaffaCakes118
-
Size
1.7MB
-
Sample
240714-pdh4xszcmn
-
MD5
45c31a6657d85a83a327a9b907843e67
-
SHA1
db82cb13bbb044eac8cbe2c26e6652c51d84740d
-
SHA256
547832a55c6686cae074d6cf038493da2930962fd2c1e4dd176fee4c6d60abbf
-
SHA512
dccef6bde2f5eb79252a64832c72adfcfe728844e28caf3a7be07f1bc3421724ee33bd5bd993513d2fb728b0f0ca47f134738422af7afcd188bc885dd043ecb4
-
SSDEEP
49152:/JZoQrbTFZY1iaBOkJmZeQvV/AvT6qzL9Uutxr7:/trbTA1SZeQYTFzL9UC7
Static task
static1
Behavioral task
behavioral1
Sample
45c31a6657d85a83a327a9b907843e67_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1608
DC_MUTEX-DD5EEWG
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
1fP8x3gpGubE
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Extracted
darkcomet
BOT
kl0w.no-ip.org:1604
mozillaproxy.zapto.org:1604
DC_MUTEX-A5603PV
-
gencode
8UDgycR8v6YU
-
install
false
-
offline_keylogger
true
-
persistence
false
Extracted
latentbot
mozillaproxy.zapto.org
Targets
-
-
Target
45c31a6657d85a83a327a9b907843e67_JaffaCakes118
-
Size
1.7MB
-
MD5
45c31a6657d85a83a327a9b907843e67
-
SHA1
db82cb13bbb044eac8cbe2c26e6652c51d84740d
-
SHA256
547832a55c6686cae074d6cf038493da2930962fd2c1e4dd176fee4c6d60abbf
-
SHA512
dccef6bde2f5eb79252a64832c72adfcfe728844e28caf3a7be07f1bc3421724ee33bd5bd993513d2fb728b0f0ca47f134738422af7afcd188bc885dd043ecb4
-
SSDEEP
49152:/JZoQrbTFZY1iaBOkJmZeQvV/AvT6qzL9Uutxr7:/trbTA1SZeQYTFzL9UC7
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1