General
-
Target
JaffaCakes118_0aa0b277afed0537b4920a9f8a2d471c
-
Size
658KB
-
Sample
250220-jxdewszncw
-
MD5
0aa0b277afed0537b4920a9f8a2d471c
-
SHA1
4f5a10a31e85ef6847bb522e6346ca2ecdb2a92f
-
SHA256
e80eed3b092e540b00c0fb1cb68cfc9804bf98340ec3f8f3b280fe25ca491a5b
-
SHA512
147e929b8401559a617be20ed43fe87ed35d8a605dc608f86262dd9159944810dbd2cbdefe2a9ab135ef4353c0cef63030caa563fa6103e46f90ced06bbe5f2c
-
SSDEEP
12288:O9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/Rk:aZ1xuVVjfFoynPaVBUR8f+kN10EB2
Behavioral task
behavioral1
Sample
JaffaCakes118_0aa0b277afed0537b4920a9f8a2d471c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0aa0b277afed0537b4920a9f8a2d471c.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
JaffaCakes118_0aa0b277afed0537b4920a9f8a2d471c
-
Size
658KB
-
MD5
0aa0b277afed0537b4920a9f8a2d471c
-
SHA1
4f5a10a31e85ef6847bb522e6346ca2ecdb2a92f
-
SHA256
e80eed3b092e540b00c0fb1cb68cfc9804bf98340ec3f8f3b280fe25ca491a5b
-
SHA512
147e929b8401559a617be20ed43fe87ed35d8a605dc608f86262dd9159944810dbd2cbdefe2a9ab135ef4353c0cef63030caa563fa6103e46f90ced06bbe5f2c
-
SSDEEP
12288:O9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/Rk:aZ1xuVVjfFoynPaVBUR8f+kN10EB2
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Program crash
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5