General
-
Target
f03f4eec551892fd56cd50faefe098c3_JaffaCakes118
-
Size
758KB
-
Sample
241214-xsbx6a1mgt
-
MD5
f03f4eec551892fd56cd50faefe098c3
-
SHA1
661a0acbd9d94e8a915e59e922af36022a3d8898
-
SHA256
d8d95587173077265b251ef2ad7d0682a229ad227b5878d3d9dd9a638eef9841
-
SHA512
7b6acfc53f86b281cb2e841c1ec3f851c2b4e7b30358ec29740076d1b888bb531e35ad6465be026cee4a2fac38632609f62b60afc323f355e2ab73ce47db9c59
-
SSDEEP
12288:yXhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy452Uy:8nAw2WWeFcfbP9VPSPMTSPL/rWvzq4Ji
Behavioral task
behavioral1
Sample
f03f4eec551892fd56cd50faefe098c3_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16
andrey222.hopto.org:1604
DC_MUTEX-TUY6P8V
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
YWgrDFvxt48B
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
f03f4eec551892fd56cd50faefe098c3_JaffaCakes118
-
Size
758KB
-
MD5
f03f4eec551892fd56cd50faefe098c3
-
SHA1
661a0acbd9d94e8a915e59e922af36022a3d8898
-
SHA256
d8d95587173077265b251ef2ad7d0682a229ad227b5878d3d9dd9a638eef9841
-
SHA512
7b6acfc53f86b281cb2e841c1ec3f851c2b4e7b30358ec29740076d1b888bb531e35ad6465be026cee4a2fac38632609f62b60afc323f355e2ab73ce47db9c59
-
SSDEEP
12288:yXhpvNWw276S/DuoeFcfbmiJ99VPhYR5MTSHvLenELrWv1lZw4JuMkMh/fy452Uy:8nAw2WWeFcfbP9VPSPMTSPL/rWvzq4Ji
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1