General
-
Target
a624aa1f6f7f6eb9d04020e3e6638e84_JaffaCakes118
-
Size
881KB
-
Sample
240818-ks8kxawarg
-
MD5
a624aa1f6f7f6eb9d04020e3e6638e84
-
SHA1
a7f7463fb19e0d04c7c1d63ca2b338c3a7667dfc
-
SHA256
1374c9b8a6efcd3545952347bf2d76ee31a5170c4f5bdc914766d19bc8286cb5
-
SHA512
3e9d36a113652efd09d9a2279083da6faafc551828a15f2595bcdbe04326d6f75cacfcc137f3b1f728540fed988f91a71770aa2577bbcf2fa25dcc1177d935ea
-
SSDEEP
24576:QhGcW2ywZ1kqWgfXNTn+oRKPYuciiCWL:QXW2ywigzruciFa
Static task
static1
Behavioral task
behavioral1
Sample
a624aa1f6f7f6eb9d04020e3e6638e84_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
darkcomet
Guest16
botnetclients.zapto.org:1604
127.0.0.1:1604
DC_MUTEX-3AXC87R
-
gencode
9wPMRqlWAgCe
-
install
false
-
offline_keylogger
true
-
persistence
false
Extracted
latentbot
botnetclients.zapto.org
Targets
-
-
Target
a624aa1f6f7f6eb9d04020e3e6638e84_JaffaCakes118
-
Size
881KB
-
MD5
a624aa1f6f7f6eb9d04020e3e6638e84
-
SHA1
a7f7463fb19e0d04c7c1d63ca2b338c3a7667dfc
-
SHA256
1374c9b8a6efcd3545952347bf2d76ee31a5170c4f5bdc914766d19bc8286cb5
-
SHA512
3e9d36a113652efd09d9a2279083da6faafc551828a15f2595bcdbe04326d6f75cacfcc137f3b1f728540fed988f91a71770aa2577bbcf2fa25dcc1177d935ea
-
SSDEEP
24576:QhGcW2ywZ1kqWgfXNTn+oRKPYuciiCWL:QXW2ywigzruciFa
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1