General
-
Target
b28d71f5e9a9e74c008f8102923f5d08_JaffaCakes118
-
Size
1.6MB
-
Sample
241129-t8t7wswle1
-
MD5
b28d71f5e9a9e74c008f8102923f5d08
-
SHA1
a7769e1357506e4b66a0048d18b4c8da1df26378
-
SHA256
b8b714b79cd5de967763d423693fdd4eee57676eab485bbc3a6aaccf5cda0ba1
-
SHA512
c59c834e03ca30e0cd408082397d5b715ab5459067809aa5e44c2030e80b6d63c7a605eb96ad78c4dd3cc1abadeef0f70fb80b5c43b6b69f4ee428c1efeae4cd
-
SSDEEP
24576:saHMv6CorjqnyC8ulDrAZ0P4qgarLj+k3JUiDaiR5RzeJTdK6z:s1vqjdC8YDvP4ParLjrnWiteJTh
Static task
static1
Behavioral task
behavioral1
Sample
b28d71f5e9a9e74c008f8102923f5d08_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
darkcomet
1
hackerman123.zapto.org:1604
91.35.245.232:1604
192.168.2.111:1604
127.0.0.1:1604
DC_MUTEX-WJ89VCK
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
MuSbpc6onR2T
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Extracted
latentbot
hackerman123.zapto.org
Targets
-
-
Target
b28d71f5e9a9e74c008f8102923f5d08_JaffaCakes118
-
Size
1.6MB
-
MD5
b28d71f5e9a9e74c008f8102923f5d08
-
SHA1
a7769e1357506e4b66a0048d18b4c8da1df26378
-
SHA256
b8b714b79cd5de967763d423693fdd4eee57676eab485bbc3a6aaccf5cda0ba1
-
SHA512
c59c834e03ca30e0cd408082397d5b715ab5459067809aa5e44c2030e80b6d63c7a605eb96ad78c4dd3cc1abadeef0f70fb80b5c43b6b69f4ee428c1efeae4cd
-
SSDEEP
24576:saHMv6CorjqnyC8ulDrAZ0P4qgarLj+k3JUiDaiR5RzeJTdK6z:s1vqjdC8YDvP4ParLjrnWiteJTh
-
Darkcomet family
-
Latentbot family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5