General
-
Target
dd67f4dcc096eaf0e6d24ffbeb6ab22a_JaffaCakes118
-
Size
677KB
-
Sample
241210-g4q88a1nbk
-
MD5
dd67f4dcc096eaf0e6d24ffbeb6ab22a
-
SHA1
fdb679646cf9afacab7aabb723844ddf40d47731
-
SHA256
2695171fe89643108287f83695cbda3d256aeb9ef15c81da2117edf4783848cc
-
SHA512
b819e723848c9462ac2927c9d0e755dbd8116971ed6690be14a1de069256d2866cc87b934cadf922f8c36d994022fc9c02c95a906b1892ce97f7f70a2db2e908
-
SSDEEP
12288:yH/6wKKk1QA0gi8cNbn6I+VluyKSKAZ8dtdFqbFjGbYNeGmkVna5y8S6:yH/6wRL1gRcNbnT64/SjK3dFaabgeDU
Static task
static1
Behavioral task
behavioral1
Sample
dd67f4dcc096eaf0e6d24ffbeb6ab22a_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16
have-fun.hopto.org:1604
DC_MUTEX-LX8E21X
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
k2Cmqg9s09U5
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
dd67f4dcc096eaf0e6d24ffbeb6ab22a_JaffaCakes118
-
Size
677KB
-
MD5
dd67f4dcc096eaf0e6d24ffbeb6ab22a
-
SHA1
fdb679646cf9afacab7aabb723844ddf40d47731
-
SHA256
2695171fe89643108287f83695cbda3d256aeb9ef15c81da2117edf4783848cc
-
SHA512
b819e723848c9462ac2927c9d0e755dbd8116971ed6690be14a1de069256d2866cc87b934cadf922f8c36d994022fc9c02c95a906b1892ce97f7f70a2db2e908
-
SSDEEP
12288:yH/6wKKk1QA0gi8cNbn6I+VluyKSKAZ8dtdFqbFjGbYNeGmkVna5y8S6:yH/6wRL1gRcNbnT64/SjK3dFaabgeDU
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2