General
-
Target
JaffaCakes118_79d339df92815451fa2ecb4210e3e2da
-
Size
659KB
-
Sample
250104-p96j4azqcx
-
MD5
79d339df92815451fa2ecb4210e3e2da
-
SHA1
0f9f26177a44e4987714a0273d2706ec907bd2f0
-
SHA256
108f1fcf4cf697a1957952d921a08b9e9c66aeef720c57e45086c2cc45e7bdf7
-
SHA512
2cb66f6f4ca4daae6ede887c967b8acdc636a13bd65917efe5d1665f08a42dcd69cb07a3da9b0b1496b9697accb59d62018c37a6f20eeb51f1c55b1bbb5a9421
-
SSDEEP
12288:h9AFlAd0Z+89cxTGzO4AucTD8QP2lmFSrVs9LqnK3:XAQ6Zx9cxTmOrucTIEFSpOGO
Behavioral task
behavioral1
Sample
JaffaCakes118_79d339df92815451fa2ecb4210e3e2da.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
JaffaCakes118_79d339df92815451fa2ecb4210e3e2da
-
Size
659KB
-
MD5
79d339df92815451fa2ecb4210e3e2da
-
SHA1
0f9f26177a44e4987714a0273d2706ec907bd2f0
-
SHA256
108f1fcf4cf697a1957952d921a08b9e9c66aeef720c57e45086c2cc45e7bdf7
-
SHA512
2cb66f6f4ca4daae6ede887c967b8acdc636a13bd65917efe5d1665f08a42dcd69cb07a3da9b0b1496b9697accb59d62018c37a6f20eeb51f1c55b1bbb5a9421
-
SSDEEP
12288:h9AFlAd0Z+89cxTGzO4AucTD8QP2lmFSrVs9LqnK3:XAQ6Zx9cxTmOrucTIEFSpOGO
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6