General
-
Target
JaffaCakes118_58ef8399e896e60b181961292fb6d666
-
Size
1.2MB
-
Sample
250307-yfp5pavye1
-
MD5
58ef8399e896e60b181961292fb6d666
-
SHA1
d5b651f75234877814d8efabb6256fbc23c662ed
-
SHA256
6deff5735317a9b7addf8d9f8d3aeca1de68364e63b69037b2c916bcaee44003
-
SHA512
b9c4059148ff6ff96b376b69450a5234b4de8684ef41173601c24140da62a2b623f4117f5f483be478c9542be676cd705511d9540689b247cd44215b8c2f7b37
-
SSDEEP
24576:D6t9iwCQliK/JJDORRrQl9uM1aIcLkNC2brX5qXI8PP:Wt9iwJTDOPsrNcwNbwxP
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_58ef8399e896e60b181961292fb6d666.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_58ef8399e896e60b181961292fb6d666.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
darkcomet
enzcrash
whatthe.no-ip.biz:1604
DC_MUTEX-F54S21D
-
InstallPath
winupdate.exe
-
gencode
=fgh�Num+Xi-
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
Windows Updater
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Targets
-
-
Target
JaffaCakes118_58ef8399e896e60b181961292fb6d666
-
Size
1.2MB
-
MD5
58ef8399e896e60b181961292fb6d666
-
SHA1
d5b651f75234877814d8efabb6256fbc23c662ed
-
SHA256
6deff5735317a9b7addf8d9f8d3aeca1de68364e63b69037b2c916bcaee44003
-
SHA512
b9c4059148ff6ff96b376b69450a5234b4de8684ef41173601c24140da62a2b623f4117f5f483be478c9542be676cd705511d9540689b247cd44215b8c2f7b37
-
SSDEEP
24576:D6t9iwCQliK/JJDORRrQl9uM1aIcLkNC2brX5qXI8PP:Wt9iwJTDOPsrNcwNbwxP
-
Blackshades family
-
Blackshades payload
-
Darkcomet family
-
Hawkeye family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Windows security bypass
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies RDP port number used by Windows
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Windows security modification
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
5Active Setup
1Registry Run Keys / Startup Folder
3Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
5Active Setup
1Registry Run Keys / Startup Folder
3Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Safe Mode Boot
1Modify Registry
13Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4