General

  • Target

    639c5176777eb4d0d8e4b2a15d1601d4_JaffaCakes118

  • Size

    3.4MB

  • Sample

    241020-wqltxatgnr

  • MD5

    639c5176777eb4d0d8e4b2a15d1601d4

  • SHA1

    54bb7638c3e1f2159644b86df0a3c22488c9ce38

  • SHA256

    6b6cafa9c7bc66f4b11ba4f9254f099b0b6773f497b713cb45ee7072bd2cd717

  • SHA512

    96f819a161d24332671cd3b49dc59a42c3000fe23c120cf44bedabedd85dd7956a424ab03fc72eb49a46fa7da3b26ffedf4935c38e62941acb5250e09dde70e6

  • SSDEEP

    49152:zpkaSo/WYCIuxQLytxkOL0QRncMtMD6UJwINhtiAlZQOf/6k1l1:zn9GjASkDMtGNh9ZpZ1l1

Malware Config

Targets

    • Target

      639c5176777eb4d0d8e4b2a15d1601d4_JaffaCakes118

    • Size

      3.4MB

    • MD5

      639c5176777eb4d0d8e4b2a15d1601d4

    • SHA1

      54bb7638c3e1f2159644b86df0a3c22488c9ce38

    • SHA256

      6b6cafa9c7bc66f4b11ba4f9254f099b0b6773f497b713cb45ee7072bd2cd717

    • SHA512

      96f819a161d24332671cd3b49dc59a42c3000fe23c120cf44bedabedd85dd7956a424ab03fc72eb49a46fa7da3b26ffedf4935c38e62941acb5250e09dde70e6

    • SSDEEP

      49152:zpkaSo/WYCIuxQLytxkOL0QRncMtMD6UJwINhtiAlZQOf/6k1l1:zn9GjASkDMtGNh9ZpZ1l1

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks