General
-
Target
99d2656e3599ba235242dc9763b3940b_JaffaCakes118
-
Size
5.0MB
-
Sample
241125-heedsstng1
-
MD5
99d2656e3599ba235242dc9763b3940b
-
SHA1
2ac901d260222eed2c8d7f1cdc92ae8d11b50c7b
-
SHA256
bb14ef332f01f1db8ce7a225adc9fe5f6ee5c4a6ffd2038478065e270080abad
-
SHA512
af8c8fd9e842ad21feb9da2c06637dc484927714a7c562f2916e1fe4f349bf2a12fd513e750440a02280ee773a8bcaf9df0f97dba5b8cbc7d81c521adee78ce3
-
SSDEEP
98304:Bp0K5DI69NeNw/V/dMBJ5Yr0M1oDBoMqnE6oNv7rW:BDB/tN/YJOozDBiE667rW
Static task
static1
Behavioral task
behavioral1
Sample
99d2656e3599ba235242dc9763b3940b_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
99d2656e3599ba235242dc9763b3940b_JaffaCakes118
-
Size
5.0MB
-
MD5
99d2656e3599ba235242dc9763b3940b
-
SHA1
2ac901d260222eed2c8d7f1cdc92ae8d11b50c7b
-
SHA256
bb14ef332f01f1db8ce7a225adc9fe5f6ee5c4a6ffd2038478065e270080abad
-
SHA512
af8c8fd9e842ad21feb9da2c06637dc484927714a7c562f2916e1fe4f349bf2a12fd513e750440a02280ee773a8bcaf9df0f97dba5b8cbc7d81c521adee78ce3
-
SSDEEP
98304:Bp0K5DI69NeNw/V/dMBJ5Yr0M1oDBoMqnE6oNv7rW:BDB/tN/YJOozDBiE667rW
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies security service
-
Disables RegEdit via registry modification
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1