General
-
Target
JaffaCakes118_2e5aa4f71a66797dedbd8ebe2b0b39d9
-
Size
570KB
-
Sample
250113-yvz87sylgr
-
MD5
2e5aa4f71a66797dedbd8ebe2b0b39d9
-
SHA1
a082c7f6a47d52e6da49af8a1c31625c9a66a4ec
-
SHA256
4f9164aa8cc84824e56470903699f83a7385b89a55f4949131405956554f545d
-
SHA512
312ab6d102fc9bba09352b1d5a1f8f045c17c76f0ac789c1eb73e2b1d984360238c3e8309dfd8847b30a904ddd6c823309f8c2f06dfa454d00d05c88b14bb06a
-
SSDEEP
12288:4qjAv4eOn7Oexhy1bqEGgHzfe6k6jrh0n2dsZ/k78/x0D3bIi5kUeRoSl:Z0geOn7OiEGgbvk6Hhw08/xc3b35k
Behavioral task
behavioral1
Sample
JaffaCakes118_2e5aa4f71a66797dedbd8ebe2b0b39d9.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
JaffaCakes118_2e5aa4f71a66797dedbd8ebe2b0b39d9
-
Size
570KB
-
MD5
2e5aa4f71a66797dedbd8ebe2b0b39d9
-
SHA1
a082c7f6a47d52e6da49af8a1c31625c9a66a4ec
-
SHA256
4f9164aa8cc84824e56470903699f83a7385b89a55f4949131405956554f545d
-
SHA512
312ab6d102fc9bba09352b1d5a1f8f045c17c76f0ac789c1eb73e2b1d984360238c3e8309dfd8847b30a904ddd6c823309f8c2f06dfa454d00d05c88b14bb06a
-
SSDEEP
12288:4qjAv4eOn7Oexhy1bqEGgHzfe6k6jrh0n2dsZ/k78/x0D3bIi5kUeRoSl:Z0geOn7OiEGgbvk6Hhw08/xc3b35k
-
Darkcomet family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2