General
-
Target
JaffaCakes118_c99f2f9d8bf76a0f5df6c68c0064b79b
-
Size
960KB
-
Sample
250209-bvr69szrcy
-
MD5
c99f2f9d8bf76a0f5df6c68c0064b79b
-
SHA1
6c1227ae30358b799692990bf277d8291ce8847d
-
SHA256
4346e483651ad78f456c640d9b7df0a0818d37497216d79f2e885d39d6a95430
-
SHA512
f26c47cb6edb11ef5167fe1617d16eca1d48ac63cb0ffc9540aa228d9d3ef7127bd676451b40f06301058f8582d4e60b851b531708987dfba0b53b71ce01296c
-
SSDEEP
24576:aBUx73EDlSNnYMQwQ6iyIakELz9JysaZbmNrU69:aBm73glSolvL8zzTaZSg69
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c99f2f9d8bf76a0f5df6c68c0064b79b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c99f2f9d8bf76a0f5df6c68c0064b79b.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
darkcomet
Victime
mougly.zapto.org:1604
DC_MUTEX-W9LP9DR
-
InstallPath
Unknown\unknown.exe
-
gencode
taca-�DWWfVW
-
install
true
-
offline_keylogger
true
-
password
pinpin55
-
persistence
true
-
reg_key
unknown
Targets
-
-
Target
JaffaCakes118_c99f2f9d8bf76a0f5df6c68c0064b79b
-
Size
960KB
-
MD5
c99f2f9d8bf76a0f5df6c68c0064b79b
-
SHA1
6c1227ae30358b799692990bf277d8291ce8847d
-
SHA256
4346e483651ad78f456c640d9b7df0a0818d37497216d79f2e885d39d6a95430
-
SHA512
f26c47cb6edb11ef5167fe1617d16eca1d48ac63cb0ffc9540aa228d9d3ef7127bd676451b40f06301058f8582d4e60b851b531708987dfba0b53b71ce01296c
-
SSDEEP
24576:aBUx73EDlSNnYMQwQ6iyIakELz9JysaZbmNrU69:aBm73glSolvL8zzTaZSg69
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
4