General
-
Target
JaffaCakes118_6b6a94ac17d74979c41f9df5dd987740
-
Size
779KB
-
Sample
250103-khzj9aynfj
-
MD5
6b6a94ac17d74979c41f9df5dd987740
-
SHA1
f51f2ad7cb34073d5ef5fc900368369202331506
-
SHA256
0a1da724132eca214511cff376c2ba53ae7fa63b96d6f60a3f51a205caf43e90
-
SHA512
0e0329f21bd82ac2d7dd6dd67b9a5c49b09a92d2294b506176454d80420447a2746f2240353c64e16ce6714afbec9a5df5ccb87011dc0a39f76984282b31d69d
-
SSDEEP
12288:h4YJH6lgnTSwfC55c7nnoUIRk1WtEupY5saNLlSsl5HOYdyYLI:h4+H6lpwfC56DOq0tEupSB6Cf0
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6b6a94ac17d74979c41f9df5dd987740.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
HaCkEd
imasoldier.zapto.org:1065
DC_MUTEX-F4Y6Y3U
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
NvNoWDafnVkg
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
JaffaCakes118_6b6a94ac17d74979c41f9df5dd987740
-
Size
779KB
-
MD5
6b6a94ac17d74979c41f9df5dd987740
-
SHA1
f51f2ad7cb34073d5ef5fc900368369202331506
-
SHA256
0a1da724132eca214511cff376c2ba53ae7fa63b96d6f60a3f51a205caf43e90
-
SHA512
0e0329f21bd82ac2d7dd6dd67b9a5c49b09a92d2294b506176454d80420447a2746f2240353c64e16ce6714afbec9a5df5ccb87011dc0a39f76984282b31d69d
-
SSDEEP
12288:h4YJH6lgnTSwfC55c7nnoUIRk1WtEupY5saNLlSsl5HOYdyYLI:h4+H6lpwfC56DOq0tEupSB6Cf0
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies security service
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6