General
-
Target
6905a6ca3f102b6ef15e201f78c1832f_JaffaCakes118
-
Size
1013KB
-
Sample
240723-1es63asgng
-
MD5
6905a6ca3f102b6ef15e201f78c1832f
-
SHA1
82381130e1ff8bca669458a9dd6fc1a239dc20e4
-
SHA256
be6107f8f8c8cbea54ea42a1f07bfddcb96869b0ac9daf2402c823ef07720b5f
-
SHA512
95e68679ae0a7ea48c9eb05a95cabd570a3d3bcb57ca840436419496e340c0788f09163b7ead48f68f32c0af2fa5e79a2398a63df8b527ae83f567b3665e986c
-
SSDEEP
12288:T1Eu4AZ+EOJTSNT8JpclOVgvcWS2LgHtJpXMKI1jdT5yRVhJUzIwX5+9NB8GYbnh:/0GMG15eisLl74ZYS+/VRZ
Static task
static1
Behavioral task
behavioral1
Sample
6905a6ca3f102b6ef15e201f78c1832f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6905a6ca3f102b6ef15e201f78c1832f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
darkcomet
Guest16_min
127.0.0.1:1604
DCMIN_MUTEX-HKW1NR3
-
InstallPath
DCSCMIN\IMDCSC.exe
-
gencode
TwujvCFEKqKu
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
imdcsc
Targets
-
-
Target
6905a6ca3f102b6ef15e201f78c1832f_JaffaCakes118
-
Size
1013KB
-
MD5
6905a6ca3f102b6ef15e201f78c1832f
-
SHA1
82381130e1ff8bca669458a9dd6fc1a239dc20e4
-
SHA256
be6107f8f8c8cbea54ea42a1f07bfddcb96869b0ac9daf2402c823ef07720b5f
-
SHA512
95e68679ae0a7ea48c9eb05a95cabd570a3d3bcb57ca840436419496e340c0788f09163b7ead48f68f32c0af2fa5e79a2398a63df8b527ae83f567b3665e986c
-
SSDEEP
12288:T1Eu4AZ+EOJTSNT8JpclOVgvcWS2LgHtJpXMKI1jdT5yRVhJUzIwX5+9NB8GYbnh:/0GMG15eisLl74ZYS+/VRZ
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1