General
-
Target
JaffaCakes118_b7853bcc846be9c535dbd9a4142c7b76
-
Size
750KB
-
Sample
250118-3m8b3azjbk
-
MD5
b7853bcc846be9c535dbd9a4142c7b76
-
SHA1
2be95d4dac045448111f59cf90797c985c90b47f
-
SHA256
780733335c09856c77b0c707449a914ab4d2b423344ac69682a6c80ea2315f85
-
SHA512
d7786299bb4aebbbf18a59575c01acf38b79ea6d89fcbadd43eafdb1a8aae13c44b36f6b84bfbb11d8a0f964aff6471105bd35fb1801c80cec057a17320be3ff
-
SSDEEP
12288:Azsvvl1fBB8lGQ4dq4k6zw6EwupNGBAF88iprb16d8Eo3r8fr6qDBv2X2WalP:A4vvzAlGRkwFEwupN6AFIn6dUWzakP
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b7853bcc846be9c535dbd9a4142c7b76.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b7853bcc846be9c535dbd9a4142c7b76.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_b7853bcc846be9c535dbd9a4142c7b76
-
Size
750KB
-
MD5
b7853bcc846be9c535dbd9a4142c7b76
-
SHA1
2be95d4dac045448111f59cf90797c985c90b47f
-
SHA256
780733335c09856c77b0c707449a914ab4d2b423344ac69682a6c80ea2315f85
-
SHA512
d7786299bb4aebbbf18a59575c01acf38b79ea6d89fcbadd43eafdb1a8aae13c44b36f6b84bfbb11d8a0f964aff6471105bd35fb1801c80cec057a17320be3ff
-
SSDEEP
12288:Azsvvl1fBB8lGQ4dq4k6zw6EwupNGBAF88iprb16d8Eo3r8fr6qDBv2X2WalP:A4vvzAlGRkwFEwupN6AFIn6dUWzakP
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5