General
-
Target
bc0e2e5ffa048dc7ed2330b9bf0ce717_JaffaCakes118
-
Size
292KB
-
Sample
241203-gwfshsyqam
-
MD5
bc0e2e5ffa048dc7ed2330b9bf0ce717
-
SHA1
9d7f04d2fc307375f498cb247f56b5459eef2680
-
SHA256
a18b0e487d18d6656384d5b1039a4d0db4203669789a0e45c894e7675201cc18
-
SHA512
71d98552e118189f1773f9bbc7d28d5f9fcb29a59aa6503293b59f1846ef4a37ef7de8cd1f44c9014025b771d51fe50e35e430009c1ed48ccd8c20d0a3f4ba42
-
SSDEEP
6144:KXtV28NQJMCgnrEOjR5suI1PIRYhaZKicXBb+9w9soyKz88ELUgy:KD28NQJb4EOjR5Fk3Bbfzy2ELHy
Static task
static1
Behavioral task
behavioral1
Sample
bc0e2e5ffa048dc7ed2330b9bf0ce717_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
bc0e2e5ffa048dc7ed2330b9bf0ce717_JaffaCakes118
-
Size
292KB
-
MD5
bc0e2e5ffa048dc7ed2330b9bf0ce717
-
SHA1
9d7f04d2fc307375f498cb247f56b5459eef2680
-
SHA256
a18b0e487d18d6656384d5b1039a4d0db4203669789a0e45c894e7675201cc18
-
SHA512
71d98552e118189f1773f9bbc7d28d5f9fcb29a59aa6503293b59f1846ef4a37ef7de8cd1f44c9014025b771d51fe50e35e430009c1ed48ccd8c20d0a3f4ba42
-
SSDEEP
6144:KXtV28NQJMCgnrEOjR5suI1PIRYhaZKicXBb+9w9soyKz88ELUgy:KD28NQJb4EOjR5Fk3Bbfzy2ELHy
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1