General
-
Target
JaffaCakes118_a1cbb38a007ac7d907a657370e4d81d3
-
Size
283KB
-
Sample
250206-sh2zdazphq
-
MD5
a1cbb38a007ac7d907a657370e4d81d3
-
SHA1
743fe5c1b7056e358a6c84db5ad1b214e002fb81
-
SHA256
77f4ac865a0c893d1667f97795899264be2b7f16e00ef4134b01873d29438903
-
SHA512
9fcd8f989656ce3d6d11efa31821e32f42fda2da39adfc26f13c3d811444d73f5ea82edad8c43d6f3b2944a6d0f88da2672db85896855f01f5ab12988d9a44cf
-
SSDEEP
6144:ZcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37P:ZcW7KEZlPzCy37P
Behavioral task
behavioral1
Sample
JaffaCakes118_a1cbb38a007ac7d907a657370e4d81d3.exe
Resource
win10ltsc2021-20250128-en
Malware Config
Extracted
darkcomet
Guest16
ultrakrautlp.zapto.org:1604
DC_MUTEX-45WQE80
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
woj8h9nkwYmm
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Extracted
latentbot
ultrakrautlp.zapto.org
Targets
-
-
Target
JaffaCakes118_a1cbb38a007ac7d907a657370e4d81d3
-
Size
283KB
-
MD5
a1cbb38a007ac7d907a657370e4d81d3
-
SHA1
743fe5c1b7056e358a6c84db5ad1b214e002fb81
-
SHA256
77f4ac865a0c893d1667f97795899264be2b7f16e00ef4134b01873d29438903
-
SHA512
9fcd8f989656ce3d6d11efa31821e32f42fda2da39adfc26f13c3d811444d73f5ea82edad8c43d6f3b2944a6d0f88da2672db85896855f01f5ab12988d9a44cf
-
SSDEEP
6144:ZcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37P:ZcW7KEZlPzCy37P
-
Darkcomet family
-
Latentbot family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
7