General
-
Target
JaffaCakes118_383c7631dffe21f68470bb2b119eb5f5
-
Size
747KB
-
Sample
250301-lqny6axvhs
-
MD5
383c7631dffe21f68470bb2b119eb5f5
-
SHA1
498c4206435c79bcb0fb7bb8250d38d0e0b2c7c6
-
SHA256
8a5ae549f49aa6ccdf799dffac687f313078d064d65cd650aa92963f90c75afc
-
SHA512
bfa80054db09915817599fc3d0cf1f68f096da5897478326e691d7f6596ff9c51d7f90736f8fead26bcf70d9e855d84e5fc515f8595a28684f03be194799f8be
-
SSDEEP
12288:36A84PaHhfD/tV9sj5NKR0pau9XGyu2qBVGLQyTPfhkPgx:qAmBpVKHu0Mu9Xo20VGLVP5N
Behavioral task
behavioral1
Sample
JaffaCakes118_383c7631dffe21f68470bb2b119eb5f5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_383c7631dffe21f68470bb2b119eb5f5.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
darkcomet
nooby
twidz.sytes.net:1604
DC_MUTEX-70JEKY8
-
InstallPath
drivers\etc\hosts.exe
-
gencode
2*9Gqb/dxoL3
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
hosts
Targets
-
-
Target
JaffaCakes118_383c7631dffe21f68470bb2b119eb5f5
-
Size
747KB
-
MD5
383c7631dffe21f68470bb2b119eb5f5
-
SHA1
498c4206435c79bcb0fb7bb8250d38d0e0b2c7c6
-
SHA256
8a5ae549f49aa6ccdf799dffac687f313078d064d65cd650aa92963f90c75afc
-
SHA512
bfa80054db09915817599fc3d0cf1f68f096da5897478326e691d7f6596ff9c51d7f90736f8fead26bcf70d9e855d84e5fc515f8595a28684f03be194799f8be
-
SSDEEP
12288:36A84PaHhfD/tV9sj5NKR0pau9XGyu2qBVGLQyTPfhkPgx:qAmBpVKHu0Mu9Xo20VGLVP5N
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
7