General
-
Target
a70d7083f7c78d14bcfab1ba8d3a61bc_JaffaCakes118
-
Size
690KB
-
Sample
241127-k4dvnsxkfv
-
MD5
a70d7083f7c78d14bcfab1ba8d3a61bc
-
SHA1
2e2affc3dd9150e8f982ba5f257fcac21df99510
-
SHA256
75fbe73bb77ba570054ef65d449d4159001e1f9c3374c8ce9dd79654e5819b05
-
SHA512
fe100f75c2716f6e1304413242b2c751d6acb6dc3df406c948a7a22fdf2434ef2bde579666338f5277b5433c2569c1ee46efb68a59a7a555cb370abdf03d52ff
-
SSDEEP
12288:LkHcpSHY7VSrfT2/czO3HPGMxwcMTdBZjhEWNQIRuPUJhqfGYx8v4l2:o8uYxSrDzwvt2cqdLhDNQiXJ+GE8
Static task
static1
Behavioral task
behavioral1
Sample
a70d7083f7c78d14bcfab1ba8d3a61bc_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
a70d7083f7c78d14bcfab1ba8d3a61bc_JaffaCakes118
-
Size
690KB
-
MD5
a70d7083f7c78d14bcfab1ba8d3a61bc
-
SHA1
2e2affc3dd9150e8f982ba5f257fcac21df99510
-
SHA256
75fbe73bb77ba570054ef65d449d4159001e1f9c3374c8ce9dd79654e5819b05
-
SHA512
fe100f75c2716f6e1304413242b2c751d6acb6dc3df406c948a7a22fdf2434ef2bde579666338f5277b5433c2569c1ee46efb68a59a7a555cb370abdf03d52ff
-
SSDEEP
12288:LkHcpSHY7VSrfT2/czO3HPGMxwcMTdBZjhEWNQIRuPUJhqfGYx8v4l2:o8uYxSrDzwvt2cqdLhDNQiXJ+GE8
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1