General
-
Target
JaffaCakes118_ea22dbe818b8a7031897429998ef8778
-
Size
468KB
-
Sample
250211-zk6tnszmat
-
MD5
ea22dbe818b8a7031897429998ef8778
-
SHA1
88e152efa897a16193aed0ffd22410b96af6ebf5
-
SHA256
46bc95e6cdb49ae4491cd29b9718d5f16c9c94c65bb05e8946274a5b2765d2c3
-
SHA512
340a16f139dc7216f84092438b90e30ea33c80f07d6bbd940f2bda61aa3e0148ecfc8020536b19478fb15b62352c8515be5b73d1e693a5e91faf837c0c9ef7df
-
SSDEEP
12288:qv6TtcangW9YrH3vbADd/z9dD4NOzIF4AK7+7hN:c5TAZBdDYDqAr
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ea22dbe818b8a7031897429998ef8778.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest88
ServerBudau.no-ip.org:7708
DC_MUTEX-PBP25X3
-
InstallPath
AudioDriver\AudioDriver32.exe
-
gencode
BK20xCK3d�rR
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
AudioDriver
Targets
-
-
Target
JaffaCakes118_ea22dbe818b8a7031897429998ef8778
-
Size
468KB
-
MD5
ea22dbe818b8a7031897429998ef8778
-
SHA1
88e152efa897a16193aed0ffd22410b96af6ebf5
-
SHA256
46bc95e6cdb49ae4491cd29b9718d5f16c9c94c65bb05e8946274a5b2765d2c3
-
SHA512
340a16f139dc7216f84092438b90e30ea33c80f07d6bbd940f2bda61aa3e0148ecfc8020536b19478fb15b62352c8515be5b73d1e693a5e91faf837c0c9ef7df
-
SSDEEP
12288:qv6TtcangW9YrH3vbADd/z9dD4NOzIF4AK7+7hN:c5TAZBdDYDqAr
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1