General
-
Target
711df29e60d8a74ad47631bba8f7117d_JaffaCakes118
-
Size
884KB
-
Sample
241023-2gx4gavcrp
-
MD5
711df29e60d8a74ad47631bba8f7117d
-
SHA1
3e9b75937d773a8af19f9d8e9a68e3ab5122bca2
-
SHA256
d2ee35035c1cc7520ed64bd1eec5726049ee24eeed1f9273fd71b4b1d71aa61a
-
SHA512
b16cd5f91aaa31b507603f3f97263bf6551883de5431644737f94f1fa97d62187197e3dc29383cf892771209e76902775a7577526cf99d273c1877e39b8b8e55
-
SSDEEP
24576:EBNHdKM24CzmdVGiyXzZtkfGoHiSeAjRF:KH8M29mHQDZaeoHiSeAjRF
Static task
static1
Behavioral task
behavioral1
Sample
711df29e60d8a74ad47631bba8f7117d_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16
192.168.56.1:1500
tueur7z.no-ip.biz:1500
DC_MUTEX-REY3N5D
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
iJWR20CYw4f4
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
711df29e60d8a74ad47631bba8f7117d_JaffaCakes118
-
Size
884KB
-
MD5
711df29e60d8a74ad47631bba8f7117d
-
SHA1
3e9b75937d773a8af19f9d8e9a68e3ab5122bca2
-
SHA256
d2ee35035c1cc7520ed64bd1eec5726049ee24eeed1f9273fd71b4b1d71aa61a
-
SHA512
b16cd5f91aaa31b507603f3f97263bf6551883de5431644737f94f1fa97d62187197e3dc29383cf892771209e76902775a7577526cf99d273c1877e39b8b8e55
-
SSDEEP
24576:EBNHdKM24CzmdVGiyXzZtkfGoHiSeAjRF:KH8M29mHQDZaeoHiSeAjRF
-
Modifies WinLogon for persistence
-
Modifies security service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6