General
-
Target
JaffaCakes118_b36cd4b822dbcb20f49566deccbd1e11
-
Size
935KB
-
Sample
250207-fz9z4a1rdp
-
MD5
b36cd4b822dbcb20f49566deccbd1e11
-
SHA1
37e196dd4bd86d86dadbf17f0bcbc6667913ec53
-
SHA256
485b3329b5c2bf40e1bab2be8807d7a4188d60a46e3a70b8fd55a26242fe1178
-
SHA512
6671e6869df42caf466dcd8beedbb7aa6d15d91ca3c972d1d10599849a1f7db572d6949e0a238060125beb4c4e13a735d2e20d32712626bbd52e9f99ffdaae09
-
SSDEEP
12288:eEdgu2FYiQTF79G6F1t1kAAWE6g17ev8WlpCtZznOVh88UVAoQi2CMte/V5B0Z6F:e1dIV8iDVG8K4iV3V78MM7inh3kh
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b36cd4b822dbcb20f49566deccbd1e11.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b36cd4b822dbcb20f49566deccbd1e11.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
192.168.1.79:1604
213.112.166.118:1604
DC_MUTEX-7XQ1YGV
-
gencode
2U78e65S33pt
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
JaffaCakes118_b36cd4b822dbcb20f49566deccbd1e11
-
Size
935KB
-
MD5
b36cd4b822dbcb20f49566deccbd1e11
-
SHA1
37e196dd4bd86d86dadbf17f0bcbc6667913ec53
-
SHA256
485b3329b5c2bf40e1bab2be8807d7a4188d60a46e3a70b8fd55a26242fe1178
-
SHA512
6671e6869df42caf466dcd8beedbb7aa6d15d91ca3c972d1d10599849a1f7db572d6949e0a238060125beb4c4e13a735d2e20d32712626bbd52e9f99ffdaae09
-
SSDEEP
12288:eEdgu2FYiQTF79G6F1t1kAAWE6g17ev8WlpCtZznOVh88UVAoQi2CMte/V5B0Z6F:e1dIV8iDVG8K4iV3V78MM7inh3kh
-
Darkcomet family
-
Modifies firewall policy service
-
Modifies security service
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Windows security modification
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6