General
-
Target
JaffaCakes118_296038823b99f5ab9a767bfe6d4d6b31
-
Size
844KB
-
Sample
250226-3zy9xsxwdw
-
MD5
296038823b99f5ab9a767bfe6d4d6b31
-
SHA1
e1fb5df79b3bc12dda55f84bf913a286276366ab
-
SHA256
b053a971958fe74b167b3016c5401bd748a618298e7056cc262d1614503c2d97
-
SHA512
bc1e7aa6b82c1dfa31775e75d7c03e94df79a34030b0d9c544c4c9a5d6feee91faf14f5bbfff795769cb588118dc142d7c8a8b3be82018b7d5e5d799816ade86
-
SSDEEP
12288:vpupUrY6k0uHKBpoIZo89TiO/1CNRZo7tjWdT0zU5/JjExxQ/ixNRhDnk:vpupUr00uqDpZJTiIajJYxa/ixNRhTk
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_296038823b99f5ab9a767bfe6d4d6b31.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_296038823b99f5ab9a767bfe6d4d6b31.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
darkcomet
4c
hvtnecyusy.servequake.com:1604
DC_MUTEX-XGTVTGV
-
InstallPath
winupdate.exe
-
gencode
3#�zeRq./lce
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
winupdater
Targets
-
-
Target
JaffaCakes118_296038823b99f5ab9a767bfe6d4d6b31
-
Size
844KB
-
MD5
296038823b99f5ab9a767bfe6d4d6b31
-
SHA1
e1fb5df79b3bc12dda55f84bf913a286276366ab
-
SHA256
b053a971958fe74b167b3016c5401bd748a618298e7056cc262d1614503c2d97
-
SHA512
bc1e7aa6b82c1dfa31775e75d7c03e94df79a34030b0d9c544c4c9a5d6feee91faf14f5bbfff795769cb588118dc142d7c8a8b3be82018b7d5e5d799816ade86
-
SSDEEP
12288:vpupUrY6k0uHKBpoIZo89TiO/1CNRZo7tjWdT0zU5/JjExxQ/ixNRhDnk:vpupUr00uqDpZJTiIajJYxa/ixNRhTk
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1