General
-
Target
5b350b845f1fbffd58e7df32b2517e64_JaffaCakes118
-
Size
1.1MB
-
Sample
241019-gvylya1dpf
-
MD5
5b350b845f1fbffd58e7df32b2517e64
-
SHA1
267a66e9be811f1adae43558018500ed310e9e5b
-
SHA256
cd480373893df19cf9d7fb3934de97f16cbfe54f00e0033bb824c6a306e376f9
-
SHA512
81c8bba81e88e319b4a9eee7d503f58eb5956f326a0f1a80bec1c089f5c6b5d9144518dd64b09b4556efa4bf69535d4de01ffb3bb1b3b299e508e407803445c3
-
SSDEEP
24576:kRmJkcoQricOIQxiZY1iaJMGT60Di1Acz:hJZoQrbTFZY1iaaOPDu5
Static task
static1
Behavioral task
behavioral1
Sample
5b350b845f1fbffd58e7df32b2517e64_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16
haaaak.no-ip.biz:1604
192.168.0.49:1604
78.193.120.61:1604
DC_MUTEX-HSKBFE5
-
InstallPath
MSDCSC\msdcscc.exe
-
gencode
zl6pN4PxD1MY
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
5b350b845f1fbffd58e7df32b2517e64_JaffaCakes118
-
Size
1.1MB
-
MD5
5b350b845f1fbffd58e7df32b2517e64
-
SHA1
267a66e9be811f1adae43558018500ed310e9e5b
-
SHA256
cd480373893df19cf9d7fb3934de97f16cbfe54f00e0033bb824c6a306e376f9
-
SHA512
81c8bba81e88e319b4a9eee7d503f58eb5956f326a0f1a80bec1c089f5c6b5d9144518dd64b09b4556efa4bf69535d4de01ffb3bb1b3b299e508e407803445c3
-
SSDEEP
24576:kRmJkcoQricOIQxiZY1iaJMGT60Di1Acz:hJZoQrbTFZY1iaaOPDu5
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1