General
-
Target
JaffaCakes118_15fa9e49e0ce430a773653a827d52197
-
Size
1.2MB
-
Sample
250221-3xsz5asrdz
-
MD5
15fa9e49e0ce430a773653a827d52197
-
SHA1
36066f8ca7341eac526f899280616630f0dab62e
-
SHA256
9f4c44b4e61565481ab3742f1d1d0f43105fe0bc1648ae59fae5c643d1d7f545
-
SHA512
a8fc141292f2de8471c1a84c6d2cab09929096e151d491434e8aabf86822849124af039f072489aee5b2e085f88d86891cb09c32f75ba77be4d244767a2e1a2f
-
SSDEEP
24576:3O7PTB3PoTTaXaaRHy/+Hb9nipw/NK9LlXdi0coKmrWN95pzvc1jrGEAq:ARIT4sGxn/g9Ltdi1mrSp4vGEH
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_15fa9e49e0ce430a773653a827d52197.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_15fa9e49e0ce430a773653a827d52197.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
darkcomet
Guest16
ahmedmisho81.zapto.org:1600
DC_MUTEX-R7D4M12
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
RGaJi6SBR5QL
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Extracted
latentbot
ahmedmisho81.zapto.org
Targets
-
-
Target
JaffaCakes118_15fa9e49e0ce430a773653a827d52197
-
Size
1.2MB
-
MD5
15fa9e49e0ce430a773653a827d52197
-
SHA1
36066f8ca7341eac526f899280616630f0dab62e
-
SHA256
9f4c44b4e61565481ab3742f1d1d0f43105fe0bc1648ae59fae5c643d1d7f545
-
SHA512
a8fc141292f2de8471c1a84c6d2cab09929096e151d491434e8aabf86822849124af039f072489aee5b2e085f88d86891cb09c32f75ba77be4d244767a2e1a2f
-
SSDEEP
24576:3O7PTB3PoTTaXaaRHy/+Hb9nipw/NK9LlXdi0coKmrWN95pzvc1jrGEAq:ARIT4sGxn/g9Ltdi1mrSp4vGEH
-
Darkcomet family
-
Latentbot family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Virtualization/Sandbox Evasion
1