General
-
Target
JaffaCakes118_2d267f4e282ea7e2160701752190d17f
-
Size
1.0MB
-
Sample
250227-pdcbdaxns9
-
MD5
2d267f4e282ea7e2160701752190d17f
-
SHA1
ef95d3c4c618963b206a1fe08b2df37b115aebef
-
SHA256
590df4b2c85d04c69c2919ad8b447a4778ddb34d80bee862da41188214d1d80f
-
SHA512
f5f8ed73ee3b9f9620aa625f2d6276cd9b8610b8a2be0a59e10adba0f3d38b3d02682f5ff7fc37c85f834e656f6a2606353b46d180196d1a3040e621bf53dee3
-
SSDEEP
12288:gH1P2w6SZivG9MA7VdielJ/qCxnWlozgDEQMjJVnbVU4klF7PwBA3rVmgj5ln/FK:gH1PF64OAprnIDERjJV6rplLrHbBfRM
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2d267f4e282ea7e2160701752190d17f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2d267f4e282ea7e2160701752190d17f.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
darkcomet
Guest16
hellblazer123.no-ip.org:1604
DC_MUTEX-7PQLMC0
-
InstallPath
Windupdt\winupdate.exe
-
gencode
ko�Y.6c=axn�
-
install
true
-
offline_keylogger
true
-
password
0126789
-
persistence
true
-
reg_key
winupdater
Targets
-
-
Target
JaffaCakes118_2d267f4e282ea7e2160701752190d17f
-
Size
1.0MB
-
MD5
2d267f4e282ea7e2160701752190d17f
-
SHA1
ef95d3c4c618963b206a1fe08b2df37b115aebef
-
SHA256
590df4b2c85d04c69c2919ad8b447a4778ddb34d80bee862da41188214d1d80f
-
SHA512
f5f8ed73ee3b9f9620aa625f2d6276cd9b8610b8a2be0a59e10adba0f3d38b3d02682f5ff7fc37c85f834e656f6a2606353b46d180196d1a3040e621bf53dee3
-
SSDEEP
12288:gH1P2w6SZivG9MA7VdielJ/qCxnWlozgDEQMjJVnbVU4klF7PwBA3rVmgj5ln/FK:gH1PF64OAprnIDERjJV6rplLrHbBfRM
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies security service
-
Windows security bypass
-
Disables Task Manager via registry modification
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1