General
-
Target
JaffaCakes118_33dc3245667316baa6718526b8378920
-
Size
738KB
-
Sample
250228-xjcs4atxgw
-
MD5
33dc3245667316baa6718526b8378920
-
SHA1
e3a33ca4dd8e7c20e1dc38239bb94b341882209d
-
SHA256
99b5eef629934b4c61bb544f3ac52c6d8e6c7d4f8dcdff2b4c0f68bce95ac968
-
SHA512
91aef173732e91a0cd6e70ed89981a741cb0b0a47c4341612633cd32a81c8d30367cfd9d374e079ed825ff85cee455f87c0c9f1c987a9cea4eaaa5d5ceca405f
-
SSDEEP
12288:S9hV3300UaiqLQU7hhTRBYvmTAJ6YzdvmIeWZPsW1BHC2AKa2SQWfDFq4:SJ3jiMPthTwe0nOWZzRm/QWfBf
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_33dc3245667316baa6718526b8378920.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_33dc3245667316baa6718526b8378920.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
darkcomet
ZADROT
hostingari.no-ip.biz:1604
DC_MUTEX-BM29NLU
-
InstallPath
MSDCSC\tasking.exe
-
gencode
HWazmVjcXfRl
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Targets
-
-
Target
JaffaCakes118_33dc3245667316baa6718526b8378920
-
Size
738KB
-
MD5
33dc3245667316baa6718526b8378920
-
SHA1
e3a33ca4dd8e7c20e1dc38239bb94b341882209d
-
SHA256
99b5eef629934b4c61bb544f3ac52c6d8e6c7d4f8dcdff2b4c0f68bce95ac968
-
SHA512
91aef173732e91a0cd6e70ed89981a741cb0b0a47c4341612633cd32a81c8d30367cfd9d374e079ed825ff85cee455f87c0c9f1c987a9cea4eaaa5d5ceca405f
-
SSDEEP
12288:S9hV3300UaiqLQU7hhTRBYvmTAJ6YzdvmIeWZPsW1BHC2AKa2SQWfDFq4:SJ3jiMPthTwe0nOWZzRm/QWfBf
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1