General
-
Target
8f62b86a64556d62d3192bf4a1ad6660_JaffaCakes118
-
Size
1.0MB
-
Sample
241104-f5yh9atpgs
-
MD5
8f62b86a64556d62d3192bf4a1ad6660
-
SHA1
768b87bc641a42119f050c19a94493c908b310a7
-
SHA256
408b365717114ce6b406c8b1dfc8dbb49679a2c37758da2a399f2628346a8943
-
SHA512
131afb3f106e235649afec855e502212c255484b1b182493ae717300f65aec9f0c62ea5cc457cef6a616fac60ac8b0eb37403dc36aac95e8afc2b59796c11996
-
SSDEEP
24576:nFE//Tct4bOsyczmyM8rn8Hry+dFG3K0bbQolC:FSVyczo
Behavioral task
behavioral1
Sample
8f62b86a64556d62d3192bf4a1ad6660_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
darkcomet
Guest
larohabi.no-ip.org:1604
larohabi.no-ip.org:8080
larohabi.no-ip.org:100
127.0.0.1:
127.0.0.1:8080
larohabi.no-ip.org:1337
DC_MUTEX-2LPNA5H
-
InstallPath
IE Explorer\ieexp.exe
-
gencode
ikLmMzDk59K0
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
Windows Updater
Targets
-
-
Target
8f62b86a64556d62d3192bf4a1ad6660_JaffaCakes118
-
Size
1.0MB
-
MD5
8f62b86a64556d62d3192bf4a1ad6660
-
SHA1
768b87bc641a42119f050c19a94493c908b310a7
-
SHA256
408b365717114ce6b406c8b1dfc8dbb49679a2c37758da2a399f2628346a8943
-
SHA512
131afb3f106e235649afec855e502212c255484b1b182493ae717300f65aec9f0c62ea5cc457cef6a616fac60ac8b0eb37403dc36aac95e8afc2b59796c11996
-
SSDEEP
24576:nFE//Tct4bOsyczmyM8rn8Hry+dFG3K0bbQolC:FSVyczo
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Disables RegEdit via registry modification
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2