General
-
Target
JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868
-
Size
1.0MB
-
Sample
250301-jbt6hst1hy
-
MD5
37969e3e1072e63d7b7cb3a4589da868
-
SHA1
7322c4e785f823a88bac1a1905b6a9552a813ff6
-
SHA256
bffdb13b50fb76a4e85e4e027e166271dbe2cc9ccaf19fbff4ba8cfeeb6ea297
-
SHA512
9b20b52d83a740cea6f7757c71d8b6a218f4b179c44d32487fd7127d2e3701bcc67d211840c214e5986f609e18ba33d01a271f8f163a45e2108935d1d475046d
-
SSDEEP
12288:YPUrHQD3AQlabjnJnIP5BfjdXmwmwGsqp/UAQQf9y0yaln2qnqGG41I9SOHlhCUC:YsTjTNebdhmMov1Cc0zdQL98hpyX
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
darkcomet
Guest16
drkcmt.no-ip.org:1604
DC_MUTEX-XRH4NSY
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
WY7jPoPv6hlA
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Targets
-
-
Target
JaffaCakes118_37969e3e1072e63d7b7cb3a4589da868
-
Size
1.0MB
-
MD5
37969e3e1072e63d7b7cb3a4589da868
-
SHA1
7322c4e785f823a88bac1a1905b6a9552a813ff6
-
SHA256
bffdb13b50fb76a4e85e4e027e166271dbe2cc9ccaf19fbff4ba8cfeeb6ea297
-
SHA512
9b20b52d83a740cea6f7757c71d8b6a218f4b179c44d32487fd7127d2e3701bcc67d211840c214e5986f609e18ba33d01a271f8f163a45e2108935d1d475046d
-
SSDEEP
12288:YPUrHQD3AQlabjnJnIP5BfjdXmwmwGsqp/UAQQf9y0yaln2qnqGG41I9SOHlhCUC:YsTjTNebdhmMov1Cc0zdQL98hpyX
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1