General
-
Target
fcd7b2c234bb370899961b06f1dd2783_JaffaCakes118
-
Size
696KB
-
Sample
240928-wjp8raydjn
-
MD5
fcd7b2c234bb370899961b06f1dd2783
-
SHA1
04c7d556f6a5cbba897324bbb8de1aa0ae988c5a
-
SHA256
b5ee0db5d1c48ee5332bfc4c05d7cfafd56a70da866895e7734ad3f9064e6a67
-
SHA512
523595c1dda22eabebbcd44a261581c114fe736d21b89603e59aaacfb3c9b3c42d83be88171d0a63e356ee522683afcd86a042122bd674336b84158024a5d582
-
SSDEEP
12288:nNX7HlO0Isvp4lak7gvdyjW46fZo1a60tXMQO8v+eA7XehOgOs:nzOxI4la5VCoow658v+eA76R
Static task
static1
Behavioral task
behavioral1
Sample
fcd7b2c234bb370899961b06f1dd2783_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
HF
192.168.0.2:100
surfingforus.zapto.org:100
DC_MUTEX-B4DJA70
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
ShXk49WH4tyF
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Extracted
latentbot
surfingforus.zapto.org
Targets
-
-
Target
fcd7b2c234bb370899961b06f1dd2783_JaffaCakes118
-
Size
696KB
-
MD5
fcd7b2c234bb370899961b06f1dd2783
-
SHA1
04c7d556f6a5cbba897324bbb8de1aa0ae988c5a
-
SHA256
b5ee0db5d1c48ee5332bfc4c05d7cfafd56a70da866895e7734ad3f9064e6a67
-
SHA512
523595c1dda22eabebbcd44a261581c114fe736d21b89603e59aaacfb3c9b3c42d83be88171d0a63e356ee522683afcd86a042122bd674336b84158024a5d582
-
SSDEEP
12288:nNX7HlO0Isvp4lak7gvdyjW46fZo1a60tXMQO8v+eA7XehOgOs:nzOxI4la5VCoow658v+eA76R
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1