General
-
Target
JaffaCakes118_111d34ac01b045687d936709bce1250e
-
Size
865KB
-
Sample
250122-zz9twawjfv
-
MD5
111d34ac01b045687d936709bce1250e
-
SHA1
2fa90f830115668ff5262ad8ab3748c419c8c31d
-
SHA256
ecced6fad4fab8949886e0e5322582b4d8f2c507cf608e5225c13433f3aaf3fd
-
SHA512
3693815921f78767bffafd8161351916c091ebafb411e418f17425b79152ef1bfe10ef8db133477344a47246a5579091f1e980c00f551be8c17fe7cb2c236a1f
-
SSDEEP
12288:4X2JVHMRtDaSm3TJvVNvWV5YTsY7tHwbz/htfcoCoK632zb7G/QOOoe:uss2Sm39NNv9wY7tHwbzfIoK6Mo0l
Behavioral task
behavioral1
Sample
JaffaCakes118_111d34ac01b045687d936709bce1250e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_111d34ac01b045687d936709bce1250e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
192.168.2.102:1604
79.220.233.250:1604
DC_MUTEX-7AF2NNS
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
boVoHKgbH3xj
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
JaffaCakes118_111d34ac01b045687d936709bce1250e
-
Size
865KB
-
MD5
111d34ac01b045687d936709bce1250e
-
SHA1
2fa90f830115668ff5262ad8ab3748c419c8c31d
-
SHA256
ecced6fad4fab8949886e0e5322582b4d8f2c507cf608e5225c13433f3aaf3fd
-
SHA512
3693815921f78767bffafd8161351916c091ebafb411e418f17425b79152ef1bfe10ef8db133477344a47246a5579091f1e980c00f551be8c17fe7cb2c236a1f
-
SSDEEP
12288:4X2JVHMRtDaSm3TJvVNvWV5YTsY7tHwbz/htfcoCoK632zb7G/QOOoe:uss2Sm39NNv9wY7tHwbzfIoK6Mo0l
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5