General
-
Target
4e80168bcb2673f9fb284d339a1f36be_JaffaCakes118
-
Size
794KB
-
Sample
241016-xpmkgswfqb
-
MD5
4e80168bcb2673f9fb284d339a1f36be
-
SHA1
55d06c980caf3920a53846dfe106c2e83fe11fae
-
SHA256
5732ac20218d329557e17f8babfa74c8ecc5035b2c021d80ec42da75a8c50926
-
SHA512
d12bdb85500d096ba714c2b742ff63da99ff5a2aa69ae23d661c9ab4c9ca8beca458947c813a4c03127b22ef10b9bab5a07c17dcda623021ba4e3526d519e021
-
SSDEEP
12288:7l6RkwVNVSNW9dDRySO94a29sL1Ni8r1NTTbsTohYWEgRW1ah2M:7wkwVmNW9lBNs5Ni8rXTPsE3LIahR
Static task
static1
Behavioral task
behavioral1
Sample
4e80168bcb2673f9fb284d339a1f36be_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16
bomido.no-ip.biz:5000
DC_MUTEX-QJ5HZQG
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
9GXWxSfCCvaS
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
4e80168bcb2673f9fb284d339a1f36be_JaffaCakes118
-
Size
794KB
-
MD5
4e80168bcb2673f9fb284d339a1f36be
-
SHA1
55d06c980caf3920a53846dfe106c2e83fe11fae
-
SHA256
5732ac20218d329557e17f8babfa74c8ecc5035b2c021d80ec42da75a8c50926
-
SHA512
d12bdb85500d096ba714c2b742ff63da99ff5a2aa69ae23d661c9ab4c9ca8beca458947c813a4c03127b22ef10b9bab5a07c17dcda623021ba4e3526d519e021
-
SSDEEP
12288:7l6RkwVNVSNW9dDRySO94a29sL1Ni8r1NTTbsTohYWEgRW1ah2M:7wkwVmNW9lBNs5Ni8rXTPsE3LIahR
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
4