General
-
Target
JaffaCakes118_fed30a16e3b1dbda2f4d15b2aae34168
-
Size
714KB
-
Sample
250216-dd3yjsylak
-
MD5
fed30a16e3b1dbda2f4d15b2aae34168
-
SHA1
604e8a9aa82f44bf55775916094d0d18e8282751
-
SHA256
eda2e447c8bc5d389b98c20385112b9f054b56343731c9b103e7528788a29f46
-
SHA512
4b5043f502a0d002a226d95c1f14f6e66e9e9bfaf080683621467612a479c7bf624d258d5a57e70ccd84157a78242dc1cb46817bc1203b6c5bf4ca2d4fc49295
-
SSDEEP
12288:qaAchpWsuVTv7ItY8XljyypHP7cOLBev03hlULsmWZ++09ZcKDVsgdW:rAEENIq8XwyVPQclDq/+WnpsSW
Behavioral task
behavioral1
Sample
JaffaCakes118_fed30a16e3b1dbda2f4d15b2aae34168.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_fed30a16e3b1dbda2f4d15b2aae34168.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
darkcomet
Guest16
192.168.1.100:1604
DC_MUTEX-0PH35V6
-
InstallPath
Windupdt\winupdate.exe
-
gencode
=lr$etRb$*1C
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
winupdater
Targets
-
-
Target
JaffaCakes118_fed30a16e3b1dbda2f4d15b2aae34168
-
Size
714KB
-
MD5
fed30a16e3b1dbda2f4d15b2aae34168
-
SHA1
604e8a9aa82f44bf55775916094d0d18e8282751
-
SHA256
eda2e447c8bc5d389b98c20385112b9f054b56343731c9b103e7528788a29f46
-
SHA512
4b5043f502a0d002a226d95c1f14f6e66e9e9bfaf080683621467612a479c7bf624d258d5a57e70ccd84157a78242dc1cb46817bc1203b6c5bf4ca2d4fc49295
-
SSDEEP
12288:qaAchpWsuVTv7ItY8XljyypHP7cOLBev03hlULsmWZ++09ZcKDVsgdW:rAEENIq8XwyVPQclDq/+WnpsSW
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Windows security bypass
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6