General
-
Target
JaffaCakes118_6d762a94e66deec625a3620e4850fca0
-
Size
756KB
-
Sample
250103-scksxazlcv
-
MD5
6d762a94e66deec625a3620e4850fca0
-
SHA1
0819e2d83f56030c9d26a913741bc3b41a9880c4
-
SHA256
f05d4b5a46ea65ecea6f6c966a9d94456e216fd26c789225fda09ef7f5e2f1c8
-
SHA512
1ad2b9b1592c25f6c86eff7a317fd8dedcd775c71e3070d83becd6dee6e0185b502cef95a6c3193d20a415d06b3d86f0f1290c230a1cb58fff6e305fb7366fb0
-
SSDEEP
12288:n9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hSqMd0QZhg:BZ1xuVVjfFoynPaVBUR8f+kN10EBgD07
Behavioral task
behavioral1
Sample
JaffaCakes118_6d762a94e66deec625a3620e4850fca0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6d762a94e66deec625a3620e4850fca0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkcomet
PerceusTake
yalabeni00.no-ip.biz:1604
shen00.no-ip.biz:1604
bymicroshen.no-ip.biz:1604
DC_MUTEX-13RUG7N
-
InstallPath
MSDCSC\System.exe
-
gencode
aeErt76Z1CMf
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
System
Targets
-
-
Target
JaffaCakes118_6d762a94e66deec625a3620e4850fca0
-
Size
756KB
-
MD5
6d762a94e66deec625a3620e4850fca0
-
SHA1
0819e2d83f56030c9d26a913741bc3b41a9880c4
-
SHA256
f05d4b5a46ea65ecea6f6c966a9d94456e216fd26c789225fda09ef7f5e2f1c8
-
SHA512
1ad2b9b1592c25f6c86eff7a317fd8dedcd775c71e3070d83becd6dee6e0185b502cef95a6c3193d20a415d06b3d86f0f1290c230a1cb58fff6e305fb7366fb0
-
SSDEEP
12288:n9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hSqMd0QZhg:BZ1xuVVjfFoynPaVBUR8f+kN10EBgD07
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
7