General
-
Target
JaffaCakes118_ea5b6dd2baab2f70d557c07566560bac
-
Size
804KB
-
Sample
250211-z5c24a1nak
-
MD5
ea5b6dd2baab2f70d557c07566560bac
-
SHA1
a26106191e61a078810291024dd70259ce5f090f
-
SHA256
418ae729bb67f8c71bfd7729813a472644e13b76e5b446bea9014e3991e51f60
-
SHA512
f317453dfa4d94765672d0d814ba0ffe69c288b07f0c2554fe3ede51e1bcfd426e34a7b7d294e668de075ba4d4cdce69513fd1423a4e80c2651e74629817f971
-
SSDEEP
24576:eK9HHkb6rqK4tTLr8pmSzFVED0q+sD0QZh9u:eCHHFqKtASzbEbk
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ea5b6dd2baab2f70d557c07566560bac.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ea5b6dd2baab2f70d557c07566560bac.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Extracted
darkcomet
Guest16_min
matt.no-ip.biz:1604
DCMIN_MUTEX-18DNZPU
-
gencode
yq4lg67WWZ5d
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
JaffaCakes118_ea5b6dd2baab2f70d557c07566560bac
-
Size
804KB
-
MD5
ea5b6dd2baab2f70d557c07566560bac
-
SHA1
a26106191e61a078810291024dd70259ce5f090f
-
SHA256
418ae729bb67f8c71bfd7729813a472644e13b76e5b446bea9014e3991e51f60
-
SHA512
f317453dfa4d94765672d0d814ba0ffe69c288b07f0c2554fe3ede51e1bcfd426e34a7b7d294e668de075ba4d4cdce69513fd1423a4e80c2651e74629817f971
-
SSDEEP
24576:eK9HHkb6rqK4tTLr8pmSzFVED0q+sD0QZh9u:eCHHFqKtASzbEbk
-
Darkcomet family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1