General
-
Target
18c5620a87a3f43d0fe83450185e026d_JaffaCakes118
-
Size
690KB
-
Sample
241006-tg63dasfpm
-
MD5
18c5620a87a3f43d0fe83450185e026d
-
SHA1
3611f45ebeb12277b6f2ff2a5b45569f83cb119b
-
SHA256
b7b8721a2654f4452798041d89b76de80c0c1de70de7fad9fcf90f9984e40553
-
SHA512
db03b0cf0f109fd40935951aa1f309c1ea1feab645b4e521ecfc7788c754979ba269a376a4058a6177e22dd58989ac6a38be05e9d77e3ce163f3e0f811359cf6
-
SSDEEP
12288:N9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hV7:nZ1xuVVjfFoynPaVBUR8f+kN10EBL
Behavioral task
behavioral1
Sample
18c5620a87a3f43d0fe83450185e026d_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
darkcomet
HF
cyber-dos.no-ip.org:1337
DC_MUTEX-27MQH02
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
5HkVSsYvX6vY
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
windows components
Targets
-
-
Target
18c5620a87a3f43d0fe83450185e026d_JaffaCakes118
-
Size
690KB
-
MD5
18c5620a87a3f43d0fe83450185e026d
-
SHA1
3611f45ebeb12277b6f2ff2a5b45569f83cb119b
-
SHA256
b7b8721a2654f4452798041d89b76de80c0c1de70de7fad9fcf90f9984e40553
-
SHA512
db03b0cf0f109fd40935951aa1f309c1ea1feab645b4e521ecfc7788c754979ba269a376a4058a6177e22dd58989ac6a38be05e9d77e3ce163f3e0f811359cf6
-
SSDEEP
12288:N9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hV7:nZ1xuVVjfFoynPaVBUR8f+kN10EBL
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
7