General
-
Target
3a9dfcfdf8f157c96bd6a84c35cab7fc_JaffaCakes118
-
Size
1.0MB
-
Sample
241012-r9atjawcph
-
MD5
3a9dfcfdf8f157c96bd6a84c35cab7fc
-
SHA1
6925ff10c32120e1d25dcfb34b70812b9bd0f750
-
SHA256
8d831c08d44fbedd1995f4468fcae04093751b17e387b0731baadf00a5f502da
-
SHA512
9fbfde0aba4716a8e5c77161ab3707f00daf0636fbfff4c6807be949cfb53e9fa08a85e454014b103f5c976d5a1f58f1b67fa486e482edd023dbed9153b9ccfa
-
SSDEEP
24576:IthEVaPqL3D683bzHmtIGBP1a5hjw3oEFB+KtgKc:sEVUc35HHwI4P1a5lUt8
Behavioral task
behavioral1
Sample
3a9dfcfdf8f157c96bd6a84c35cab7fc_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Infected
cyber-dos.no-ip.org:1337
DC_MUTEX-ZVWHAEV
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
iZty6m6FmqVy
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
3a9dfcfdf8f157c96bd6a84c35cab7fc_JaffaCakes118
-
Size
1.0MB
-
MD5
3a9dfcfdf8f157c96bd6a84c35cab7fc
-
SHA1
6925ff10c32120e1d25dcfb34b70812b9bd0f750
-
SHA256
8d831c08d44fbedd1995f4468fcae04093751b17e387b0731baadf00a5f502da
-
SHA512
9fbfde0aba4716a8e5c77161ab3707f00daf0636fbfff4c6807be949cfb53e9fa08a85e454014b103f5c976d5a1f58f1b67fa486e482edd023dbed9153b9ccfa
-
SSDEEP
24576:IthEVaPqL3D683bzHmtIGBP1a5hjw3oEFB+KtgKc:sEVUc35HHwI4P1a5lUt8
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1