General
-
Target
80331cb992b4aaf28c0109096c78e137_JaffaCakes118
-
Size
2.1MB
-
Sample
241030-w4yqmazajk
-
MD5
80331cb992b4aaf28c0109096c78e137
-
SHA1
856a328b145d2a02f591d2fd62e71e21db4e0622
-
SHA256
99c3b4f9d4c32256e5ab697c5dc4ff1d753b146c846681e429e2a3eb2f207ada
-
SHA512
128e2ea41800e3a93da297921f918014ae1dc05750f7dcace823fdcd365f422127dca449dd5ce05813ce44eff195b6f589cc95bf4cc40f404bb00eb9ed79a5be
-
SSDEEP
24576:WDQMyUCLowSEwiR49iPUHV8XgYrpxbNT9IA0HD4OsqirBJu9crkQCmLMR:W8MyUCNd+vVeob0OMp2
Static task
static1
Behavioral task
behavioral1
Sample
80331cb992b4aaf28c0109096c78e137_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
80331cb992b4aaf28c0109096c78e137_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkcomet
Getjava
essstzttztz.zapto.org:1612
DC_MUTEX-NPVY9D6
-
gencode
z3bx7DQvDgi3
-
install
false
-
offline_keylogger
true
-
persistence
false
Extracted
latentbot
essstzttztz.zapto.org
Targets
-
-
Target
80331cb992b4aaf28c0109096c78e137_JaffaCakes118
-
Size
2.1MB
-
MD5
80331cb992b4aaf28c0109096c78e137
-
SHA1
856a328b145d2a02f591d2fd62e71e21db4e0622
-
SHA256
99c3b4f9d4c32256e5ab697c5dc4ff1d753b146c846681e429e2a3eb2f207ada
-
SHA512
128e2ea41800e3a93da297921f918014ae1dc05750f7dcace823fdcd365f422127dca449dd5ce05813ce44eff195b6f589cc95bf4cc40f404bb00eb9ed79a5be
-
SSDEEP
24576:WDQMyUCLowSEwiR49iPUHV8XgYrpxbNT9IA0HD4OsqirBJu9crkQCmLMR:W8MyUCNd+vVeob0OMp2
-
Darkcomet family
-
Latentbot family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1