General
-
Target
c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118
-
Size
1024KB
-
Sample
241204-ttgcgswmgr
-
MD5
c35e0f090da7e3fe6a7a0d4884210b13
-
SHA1
93d07c8517d9d36782ee82f3bdb5dd106d39388e
-
SHA256
f759238bc33a19a0f4c5b27eb8628a57698c3b7b08a9cc07510c579a5fbffed3
-
SHA512
8e3b538486636e99b2ba40d051ed1fa5977f2867657635bd6718b97b8a6bdc304ed16d1bbad0fef7a8e1555dd5d199161e64f78fe9961e7298abb80552586704
-
SSDEEP
24576:1Z1xuVVjfFoynPaVBUR8f+kN10EBhSTyLE58JKtYA+u:PQDgok30ESTyLEGK9+u
Behavioral task
behavioral1
Sample
c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16
sabahhassan.no-ip.biz:1604
DC_MUTEX-MHPA3BK
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
MAYkZ7Pow4iS
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
c35e0f090da7e3fe6a7a0d4884210b13_JaffaCakes118
-
Size
1024KB
-
MD5
c35e0f090da7e3fe6a7a0d4884210b13
-
SHA1
93d07c8517d9d36782ee82f3bdb5dd106d39388e
-
SHA256
f759238bc33a19a0f4c5b27eb8628a57698c3b7b08a9cc07510c579a5fbffed3
-
SHA512
8e3b538486636e99b2ba40d051ed1fa5977f2867657635bd6718b97b8a6bdc304ed16d1bbad0fef7a8e1555dd5d199161e64f78fe9961e7298abb80552586704
-
SSDEEP
24576:1Z1xuVVjfFoynPaVBUR8f+kN10EBhSTyLE58JKtYA+u:PQDgok30ESTyLEGK9+u
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1