General
-
Target
4dbbec1d181f1e8a146fc15a2de845c0_JaffaCakes118
-
Size
808KB
-
Sample
241016-tg31qaybjg
-
MD5
4dbbec1d181f1e8a146fc15a2de845c0
-
SHA1
1e45513f89802d5fd9d017e01642c8d742f5cb90
-
SHA256
4154bf6a7d5e70d9aa7a02bef28bee9210d3e471eedbb08de8483c6874e2730b
-
SHA512
e5c9a066626a8f7927a6328fb63ca64cafed8bb4b4548f171ef98445f4f51b9953978d4506e4ca45a4e5dc49cf84379f098c7f334a9c1fbf429d20b4b7830e88
-
SSDEEP
12288:xLRX082vL7tZiF2Mq6CoRKTpi00Mued45cChs/8W5livkT2y95o0MsE:xLu82vL7mDGTpih6xChsHl5DH+
Static task
static1
Behavioral task
behavioral1
Sample
4dbbec1d181f1e8a146fc15a2de845c0_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Victime
frgtgd.zapto.org:1604
DC_MUTEX-7VL74L1
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
PwejF4xZjG4H
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
4dbbec1d181f1e8a146fc15a2de845c0_JaffaCakes118
-
Size
808KB
-
MD5
4dbbec1d181f1e8a146fc15a2de845c0
-
SHA1
1e45513f89802d5fd9d017e01642c8d742f5cb90
-
SHA256
4154bf6a7d5e70d9aa7a02bef28bee9210d3e471eedbb08de8483c6874e2730b
-
SHA512
e5c9a066626a8f7927a6328fb63ca64cafed8bb4b4548f171ef98445f4f51b9953978d4506e4ca45a4e5dc49cf84379f098c7f334a9c1fbf429d20b4b7830e88
-
SSDEEP
12288:xLRX082vL7tZiF2Mq6CoRKTpi00Mued45cChs/8W5livkT2y95o0MsE:xLu82vL7mDGTpih6xChsHl5DH+
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1