General
-
Target
892457023564bf407be05bdf7891e929_JaffaCakes118
-
Size
1.1MB
-
Sample
241103-cpzjts1pdv
-
MD5
892457023564bf407be05bdf7891e929
-
SHA1
b0c23dba1302e3d59f3caee7e80eb2b579c78dfd
-
SHA256
d71f66fa4e06e143007d504194bc96750044f2c4c12e3686e7758bea4764dbf9
-
SHA512
7f2e02ef498f57635281bedf48d9c32ab84445ae00d45a405a322fd11d1a148268f9eafee31b71a4519602cab3f989d5c353ace91e67890557a731171f4811ea
-
SSDEEP
12288:qOAxSAZG9JeapEZpzwWCs81+i6fXFeyivRphf2mppgg3+b3L/EGJmP+9OzLTIeJ8:qO6gJMQg18eBEan5qt1g
Static task
static1
Behavioral task
behavioral1
Sample
892457023564bf407be05bdf7891e929_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
892457023564bf407be05bdf7891e929_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
892457023564bf407be05bdf7891e929_JaffaCakes118
-
Size
1.1MB
-
MD5
892457023564bf407be05bdf7891e929
-
SHA1
b0c23dba1302e3d59f3caee7e80eb2b579c78dfd
-
SHA256
d71f66fa4e06e143007d504194bc96750044f2c4c12e3686e7758bea4764dbf9
-
SHA512
7f2e02ef498f57635281bedf48d9c32ab84445ae00d45a405a322fd11d1a148268f9eafee31b71a4519602cab3f989d5c353ace91e67890557a731171f4811ea
-
SSDEEP
12288:qOAxSAZG9JeapEZpzwWCs81+i6fXFeyivRphf2mppgg3+b3L/EGJmP+9OzLTIeJ8:qO6gJMQg18eBEan5qt1g
Score10/10-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1