General
-
Target
JaffaCakes118_4989fcdd0fbffd07c5c1586c5340a30e
-
Size
1.3MB
-
Sample
250303-2jed5s1zez
-
MD5
4989fcdd0fbffd07c5c1586c5340a30e
-
SHA1
4d7929fc4c78f08f2f08be1a01d6530ebde45568
-
SHA256
cb01297ffc07f7264bf275ebb1fd44a6314381787fa965b4aeb7c6b796aa0342
-
SHA512
5376f44162c15f36ea785e7a7b92ff93e4f20c2839fe76d46014651517e7e5b4413c1fda5159e3e3fbcf98f69d912d39abe0e72c97496a66c4617364f4d61a2d
-
SSDEEP
12288:9Ym+qrJn9HTSGQ3+PLjZmdcbMV8ii6nHx+n/kmC7gr8cI4dLfMY+eTFXfliwhTX4:Uqm4H9pcDGtI4B4qfogKcUY9Kl8AC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4989fcdd0fbffd07c5c1586c5340a30e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4989fcdd0fbffd07c5c1586c5340a30e.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
darkcomet
Test_bot1
sabsync.sytes.net:9594
DC_MUTEX-13FB4FF
-
InstallPath
winlogon.exe
-
gencode
f0QC-9o-bw26
-
install
true
-
offline_keylogger
true
-
password
gta99
-
persistence
true
-
reg_key
winlogon
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Targets
-
-
Target
JaffaCakes118_4989fcdd0fbffd07c5c1586c5340a30e
-
Size
1.3MB
-
MD5
4989fcdd0fbffd07c5c1586c5340a30e
-
SHA1
4d7929fc4c78f08f2f08be1a01d6530ebde45568
-
SHA256
cb01297ffc07f7264bf275ebb1fd44a6314381787fa965b4aeb7c6b796aa0342
-
SHA512
5376f44162c15f36ea785e7a7b92ff93e4f20c2839fe76d46014651517e7e5b4413c1fda5159e3e3fbcf98f69d912d39abe0e72c97496a66c4617364f4d61a2d
-
SSDEEP
12288:9Ym+qrJn9HTSGQ3+PLjZmdcbMV8ii6nHx+n/kmC7gr8cI4dLfMY+eTFXfliwhTX4:Uqm4H9pcDGtI4B4qfogKcUY9Kl8AC
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Disables RegEdit via registry modification
-
Modifies Windows Firewall
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2