General
-
Target
JaffaCakes118_2d949b68f4fde462b7f832505bb4adcd
-
Size
686KB
-
Sample
250227-qxz28aysey
-
MD5
2d949b68f4fde462b7f832505bb4adcd
-
SHA1
aa6b039fb9710df1253fffc059503b30b906a99d
-
SHA256
096bac70f86c28b91d8a57ee4352eda89355ad23010b83a893196bc0f9aa5e42
-
SHA512
d74dda9bb8193725d68ea4de97a3b5ca19fa30c0f8325a6a4fda97dd7b801ccdf8d82fb43b355fdbabc26caa8b350ad671182ffa1b1d0c87176d7be29ab7f313
-
SSDEEP
12288:+xrDbRiGMs7GTZD0LTuZBo1qpoK4YngtM9EgNkYMuoFmytIUlIkrMIAnmomce:+VfGVaK3o1sBYM9EoeFOwAmn
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2d949b68f4fde462b7f832505bb4adcd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2d949b68f4fde462b7f832505bb4adcd.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Extracted
darkcomet
Guest16
karakartal.no-ip.info:1604
DC_MUTEX-F54S21D
-
InstallPath
Windupdt\winupdate.exe
-
gencode
DDaab*PMH#3q
-
install
true
-
offline_keylogger
false
-
persistence
true
-
reg_key
winupdater
Targets
-
-
Target
JaffaCakes118_2d949b68f4fde462b7f832505bb4adcd
-
Size
686KB
-
MD5
2d949b68f4fde462b7f832505bb4adcd
-
SHA1
aa6b039fb9710df1253fffc059503b30b906a99d
-
SHA256
096bac70f86c28b91d8a57ee4352eda89355ad23010b83a893196bc0f9aa5e42
-
SHA512
d74dda9bb8193725d68ea4de97a3b5ca19fa30c0f8325a6a4fda97dd7b801ccdf8d82fb43b355fdbabc26caa8b350ad671182ffa1b1d0c87176d7be29ab7f313
-
SSDEEP
12288:+xrDbRiGMs7GTZD0LTuZBo1qpoK4YngtM9EgNkYMuoFmytIUlIkrMIAnmomce:+VfGVaK3o1sBYM9EoeFOwAmn
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
5