General
-
Target
JaffaCakes118_5c7bcd08091c8bdd42f289967fa4f364
-
Size
1.1MB
-
Sample
250129-3nreya1pbq
-
MD5
5c7bcd08091c8bdd42f289967fa4f364
-
SHA1
4ee9545b874b21cbde906fda3d233e7d4af8b300
-
SHA256
57fd41c4cf91214e1d1bd6c7ab784072f03b0253ceb493b9976d34e03220fd0c
-
SHA512
40224376a8810a2ed13eea3179b181d08544e94a7aef83a075c06c0997078c201f6b4bd9502074a9eb14431b1da1649ddac15a98309333f596baaded3b1fa86b
-
SSDEEP
24576:PCh6a/FoVKghO6EtOSCjonOmuZRe1Lhht0Arm5ZVbt:PCh5toVKfA6MSn0ArmTVx
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5c7bcd08091c8bdd42f289967fa4f364.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5c7bcd08091c8bdd42f289967fa4f364.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
darkcomet
Guest16
sabahhassan.no-ip.biz:1604
DC_MUTEX-MHPA3BK
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
MAYkZ7Pow4iS
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Targets
-
-
Target
JaffaCakes118_5c7bcd08091c8bdd42f289967fa4f364
-
Size
1.1MB
-
MD5
5c7bcd08091c8bdd42f289967fa4f364
-
SHA1
4ee9545b874b21cbde906fda3d233e7d4af8b300
-
SHA256
57fd41c4cf91214e1d1bd6c7ab784072f03b0253ceb493b9976d34e03220fd0c
-
SHA512
40224376a8810a2ed13eea3179b181d08544e94a7aef83a075c06c0997078c201f6b4bd9502074a9eb14431b1da1649ddac15a98309333f596baaded3b1fa86b
-
SSDEEP
24576:PCh6a/FoVKghO6EtOSCjonOmuZRe1Lhht0Arm5ZVbt:PCh5toVKfA6MSn0ArmTVx
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Program crash
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1