General
-
Target
96f1323c3ee5ef6206ecf31dbb0db048_JaffaCakes118
-
Size
672KB
-
Sample
241124-ywxjpstjam
-
MD5
96f1323c3ee5ef6206ecf31dbb0db048
-
SHA1
ab56edf7e1d465de6f037d768757e8341331b4dd
-
SHA256
7add2e68bc0d0fb4696375741a13de6236c8b60b27413535e9898b3108b436c1
-
SHA512
67ff778a9a7d01de515dd0baeacd21ceb59c84870fcc8f2222b4c4b328baa427c95aa664cdbee77df0a1ef736e741656119da86b0699e6d13cf87fd50aa8cef1
-
SSDEEP
12288:dEhOSHoFIzAjCRuWoDZZegfgSyai7L4jnOtSxTFBSqURp2r7LdFG1Coi5C:jNIAQuWoDZZeuVpn6smfQG
Static task
static1
Behavioral task
behavioral1
Sample
96f1323c3ee5ef6206ecf31dbb0db048_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
96f1323c3ee5ef6206ecf31dbb0db048_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
96f1323c3ee5ef6206ecf31dbb0db048_JaffaCakes118
-
Size
672KB
-
MD5
96f1323c3ee5ef6206ecf31dbb0db048
-
SHA1
ab56edf7e1d465de6f037d768757e8341331b4dd
-
SHA256
7add2e68bc0d0fb4696375741a13de6236c8b60b27413535e9898b3108b436c1
-
SHA512
67ff778a9a7d01de515dd0baeacd21ceb59c84870fcc8f2222b4c4b328baa427c95aa664cdbee77df0a1ef736e741656119da86b0699e6d13cf87fd50aa8cef1
-
SSDEEP
12288:dEhOSHoFIzAjCRuWoDZZegfgSyai7L4jnOtSxTFBSqURp2r7LdFG1Coi5C:jNIAQuWoDZZeuVpn6smfQG
Score10/10-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1