General
-
Target
JaffaCakes118_696c96725d86dc1938286c46bf39e7d0
-
Size
720KB
-
Sample
250103-bzassaxkak
-
MD5
696c96725d86dc1938286c46bf39e7d0
-
SHA1
d00dea4527ccb182354de87c22d8c79c2d1380b3
-
SHA256
1b84100df9f7e673590ffa92f7be26344e2460ee72b97523434b66f9f755b3d1
-
SHA512
e1e4880874029a553a80ebe18e82bbc57c858383c83707d0e3483d0751715fcebc9c496b222d3bbda0c98a9405211b978fd9e3cafc727f988f72591942fa90bb
-
SSDEEP
12288:jriaKhUV+FKJpwDEEJrcyC1CabAns8iV1pw/c6dePyOE14GMWT9JGqF106Lz:6aK6VhJaPJ3xaEs78cbPyOE1PTnt
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_696c96725d86dc1938286c46bf39e7d0.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16
engtaher79.no-ip.biz:79
192.168.56.3:79
DC_MUTEX-9YMZPUD
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
MRDCry2n9S8v
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
JaffaCakes118_696c96725d86dc1938286c46bf39e7d0
-
Size
720KB
-
MD5
696c96725d86dc1938286c46bf39e7d0
-
SHA1
d00dea4527ccb182354de87c22d8c79c2d1380b3
-
SHA256
1b84100df9f7e673590ffa92f7be26344e2460ee72b97523434b66f9f755b3d1
-
SHA512
e1e4880874029a553a80ebe18e82bbc57c858383c83707d0e3483d0751715fcebc9c496b222d3bbda0c98a9405211b978fd9e3cafc727f988f72591942fa90bb
-
SSDEEP
12288:jriaKhUV+FKJpwDEEJrcyC1CabAns8iV1pw/c6dePyOE14GMWT9JGqF106Lz:6aK6VhJaPJ3xaEs78cbPyOE1PTnt
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
5