General
-
Target
fb7f296bec3cdc8ec079f808a7011fe4_JaffaCakes118
-
Size
631KB
-
Sample
241218-pea5psykg1
-
MD5
fb7f296bec3cdc8ec079f808a7011fe4
-
SHA1
30aa9f4978ddf727e86e5c4b381cc61f568f34b9
-
SHA256
b35e0f5a1b842a947ffd577ee4521e22612785bacf6dad81c803e7019156797e
-
SHA512
cc08dd452f57957cbf00cf1f2975fdb39edd7edf84e080876ad192170a53ca4d1d6d7f7bc05e19c7629bb689830dda889ba84140e216f2586b8890043b505b59
-
SSDEEP
12288:UK/xyYT2o0k3vSycsL4YAfY9vNiQNe+91BgHT9/o30i8fKtbc:+puv8QLeEfeh/o3n8Stb
Static task
static1
Behavioral task
behavioral1
Sample
fb7f296bec3cdc8ec079f808a7011fe4_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
fb7f296bec3cdc8ec079f808a7011fe4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
fb7f296bec3cdc8ec079f808a7011fe4_JaffaCakes118
-
Size
631KB
-
MD5
fb7f296bec3cdc8ec079f808a7011fe4
-
SHA1
30aa9f4978ddf727e86e5c4b381cc61f568f34b9
-
SHA256
b35e0f5a1b842a947ffd577ee4521e22612785bacf6dad81c803e7019156797e
-
SHA512
cc08dd452f57957cbf00cf1f2975fdb39edd7edf84e080876ad192170a53ca4d1d6d7f7bc05e19c7629bb689830dda889ba84140e216f2586b8890043b505b59
-
SSDEEP
12288:UK/xyYT2o0k3vSycsL4YAfY9vNiQNe+91BgHT9/o30i8fKtbc:+puv8QLeEfeh/o3n8Stb
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1