General
-
Target
JaffaCakes118_f0e5ed93d10a45df5ef2805468a1092f
-
Size
4.3MB
-
Sample
250212-rhy22svlen
-
MD5
f0e5ed93d10a45df5ef2805468a1092f
-
SHA1
d831431314316e474cd76dc2c9e9c23fed2e006b
-
SHA256
3b9d489a5d83a68aa03d38a896f79ec455ba5ff16caf5bea0aa04ff846d4b421
-
SHA512
367dfbe9354195d2a068127e5eeed07483a9aa7ab33dbc6126af43b6ab885dc7a1d02ffb8198c1fa6ebcb88ed4d2b8e32546ddd2e10d4e05a380888d41a3ba86
-
SSDEEP
98304:AH4rWqBFXasqdAYPhZSLBfPz+msa2xL2AKNuj5QcJ9a:AYVBFAA8vSlfr+vxbKaXJ
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f0e5ed93d10a45df5ef2805468a1092f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f0e5ed93d10a45df5ef2805468a1092f.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
darkcomet
Loader 2012.01
ka8evdei.no-ip.info:6969
DC_MUTEX-7JG656R
-
gencode
hJpLHl1fk4Dj
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
JaffaCakes118_f0e5ed93d10a45df5ef2805468a1092f
-
Size
4.3MB
-
MD5
f0e5ed93d10a45df5ef2805468a1092f
-
SHA1
d831431314316e474cd76dc2c9e9c23fed2e006b
-
SHA256
3b9d489a5d83a68aa03d38a896f79ec455ba5ff16caf5bea0aa04ff846d4b421
-
SHA512
367dfbe9354195d2a068127e5eeed07483a9aa7ab33dbc6126af43b6ab885dc7a1d02ffb8198c1fa6ebcb88ed4d2b8e32546ddd2e10d4e05a380888d41a3ba86
-
SSDEEP
98304:AH4rWqBFXasqdAYPhZSLBfPz+msa2xL2AKNuj5QcJ9a:AYVBFAA8vSlfr+vxbKaXJ
-
Darkcomet family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Possible privilege escalation attempt
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
1Virtualization/Sandbox Evasion
2