General
-
Target
489138ce24f0eb15983583d728ce743e_JaffaCakes118
-
Size
2.1MB
-
Sample
241015-ssvyta1hkg
-
MD5
489138ce24f0eb15983583d728ce743e
-
SHA1
9d69297b0dfbd1a5c0b6094d1016c8a4214c48fa
-
SHA256
899e7387c5ad6dab67cf14df521c9b644fd071db004e77bd46eb228da7fc0ccf
-
SHA512
089f7633605adca69a225b03fd7a15d3c5df2b3e7c2fd7d7d1dcdb933f8a5a1e4780bbac07776fe48d9acc891317a03fa28c1d635d342b7811a6fe21db6b2b4c
-
SSDEEP
49152:rYp8kzMUk+qP9dDwz+CUa2M3XlmlGjh5hZThY:rYp8kzMU2L++CaM3XlBjh5L
Static task
static1
Behavioral task
behavioral1
Sample
489138ce24f0eb15983583d728ce743e_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
darkcomet
chi
cute.no-ip.org:1604
DC_MUTEX-VD97VU5
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
7pcPid0lGKXn
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
489138ce24f0eb15983583d728ce743e_JaffaCakes118
-
Size
2.1MB
-
MD5
489138ce24f0eb15983583d728ce743e
-
SHA1
9d69297b0dfbd1a5c0b6094d1016c8a4214c48fa
-
SHA256
899e7387c5ad6dab67cf14df521c9b644fd071db004e77bd46eb228da7fc0ccf
-
SHA512
089f7633605adca69a225b03fd7a15d3c5df2b3e7c2fd7d7d1dcdb933f8a5a1e4780bbac07776fe48d9acc891317a03fa28c1d635d342b7811a6fe21db6b2b4c
-
SSDEEP
49152:rYp8kzMUk+qP9dDwz+CUa2M3XlmlGjh5hZThY:rYp8kzMU2L++CaM3XlBjh5L
-
Modifies WinLogon for persistence
-
Modifies security service
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
3