General
-
Target
JaffaCakes118_7b2c058c92c0bfcdc36f6eb6bcd0f66b
-
Size
797KB
-
Sample
250104-w54y2a1pew
-
MD5
7b2c058c92c0bfcdc36f6eb6bcd0f66b
-
SHA1
c7eb1f8c37df44d4f5560f1734dafdd12ed6477e
-
SHA256
776d7d11b5d27b5b3a713f3839fd7128e05fa6a9134fa2fed9b2928e59852322
-
SHA512
328816178c32125b73c01d03bd9670ae703e3a35c11c53e0ebbe43a9739b14ba2e77fa26be0cf215add3e2766035342253d668cb5b3f3012a172c18e60e8bec4
-
SSDEEP
12288:QQLcijICEZ+6vFkqeXGvyxngsm/CEUCR264lGYxtFYB6dsqvPMySJR2SePaG1vhW:ZcfZxFTKn8/+CR26gGYxUYFvPMygGBW
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7b2c058c92c0bfcdc36f6eb6bcd0f66b.exe
Resource
win7-20240729-en
Malware Config
Extracted
darkcomet
Guest16
imdaco.no-ip.org:1604
DC_MUTEX-L9KM9Y7
-
InstallPath
MSDCS\Rundll32.exe
-
gencode
LJp33LCadVtB
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
Rundll32
Targets
-
-
Target
JaffaCakes118_7b2c058c92c0bfcdc36f6eb6bcd0f66b
-
Size
797KB
-
MD5
7b2c058c92c0bfcdc36f6eb6bcd0f66b
-
SHA1
c7eb1f8c37df44d4f5560f1734dafdd12ed6477e
-
SHA256
776d7d11b5d27b5b3a713f3839fd7128e05fa6a9134fa2fed9b2928e59852322
-
SHA512
328816178c32125b73c01d03bd9670ae703e3a35c11c53e0ebbe43a9739b14ba2e77fa26be0cf215add3e2766035342253d668cb5b3f3012a172c18e60e8bec4
-
SSDEEP
12288:QQLcijICEZ+6vFkqeXGvyxngsm/CEUCR264lGYxtFYB6dsqvPMySJR2SePaG1vhW:ZcfZxFTKn8/+CR26gGYxUYFvPMygGBW
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1