Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
JaffaCakes118_83c698151d075740628ae7d8aaf39023
-
Size
938KB
-
Sample
250321-sx5c2s1ygy
-
MD5
83c698151d075740628ae7d8aaf39023
-
SHA1
f4725174c66a837870f74222b7cc4fa19160731b
-
SHA256
1d34ccc414f59436188e5c8a29963e16b0913b1f148c4f51eafe6ae23176ea55
-
SHA512
7a970cc742bb5103c4b7296b6f9ac11ee3870be5a8bebba75ebd2d7a0403dacbf5723b3e13bdd7dd40d628c00678feaf5f86b2a5cbe3d947cbcd23c3fa5bb04d
-
SSDEEP
24576:2FTqADbP4qXsZejCxQZPUQz/neABpcIssX0viImQG:ETvgqcZnQRUQbeAvcIhGi
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Extracted
darkcomet
Tonkman
iiili.in:5300
iiili.in:5310
iiili.in:5320
iiili.in:5330
iiili.in:5340
iiili.in:5350
iiili.in:5360
iiili.in:5370
iiili.in:5380
iiili.in:5390
illiil.in:5300
illiil.in:5310
illiil.in:5320
illiil.in:5330
illiil.in:5340
illiil.in:5350
illiil.in:5360
illiil.in:5370
illiil.in:5380
illiil.in:5390
liilli.in:5300
liilli.in:5310
liilli.in:5320
liilli.in:5330
liilli.in:5340
liilli.in:5350
liilli.in:5360
liilli.in:5370
liilli.in:5380
liilli.in:5390
lllil.in:5300
lllil.in:5310
lllil.in:5320
lllil.in:5330
lllil.in:5340
lllil.in:5350
lllil.in:5360
lllil.in:5370
lllil.in:5380
lllil.in:5390
lllllilllillll.in:5300
lllllilllillll.in:5310
lllllilllillll.in:5320
lllllilllillll.in:5330
lllllilllillll.in:5340
lllllilllillll.in:5350
lllllilllillll.in:5360
lllllilllillll.in:5370
lllllilllillll.in:5380
lllllilllillll.in:5390
iiliiiliilli.info:5300
iiliiiliilli.info:5310
iiliiiliilli.info:5320
iiliiiliilli.info:5330
iiliiiliilli.info:5340
iiliiiliilli.info:5350
iiliiiliilli.info:5360
iiliiiliilli.info:5370
iiliiiliilli.info:5380
iiliiiliilli.info:5390
iillili.info:5300
iillili.info:5310
iillili.info:5320
iillili.info:5330
iillili.info:5340
iillili.info:5350
iillili.info:5360
iillili.info:5370
iillili.info:5380
iillili.info:5390
lilliili.info:5300
lilliili.info:5310
lilliili.info:5320
lilliili.info:5330
lilliili.info:5340
lilliili.info:5350
lilliili.info:5360
lilliili.info:5370
lilliili.info:5380
lilliili.info:5390
llllillllil.info:5300
llllillllil.info:5310
llllillllil.info:5320
llllillllil.info:5330
llllillllil.info:5340
llllillllil.info:5350
llllillllil.info:5360
llllillllil.info:5370
llllillllil.info:5380
llllillllil.info:5390
llllillllili.info:5300
llllillllili.info:5310
llllillllili.info:5320
llllillllili.info:5330
llllillllili.info:5340
llllillllili.info:5350
llllillllili.info:5360
llllillllili.info:5370
llllillllili.info:5380
llllillllili.info:5390
drumgd1.zapto.org:5942
drumgd12.zapto.org:5943
BugTestingReporter
-
gencode
5d7taAMln2CM
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
JaffaCakes118_83c698151d075740628ae7d8aaf39023
-
Size
938KB
-
MD5
83c698151d075740628ae7d8aaf39023
-
SHA1
f4725174c66a837870f74222b7cc4fa19160731b
-
SHA256
1d34ccc414f59436188e5c8a29963e16b0913b1f148c4f51eafe6ae23176ea55
-
SHA512
7a970cc742bb5103c4b7296b6f9ac11ee3870be5a8bebba75ebd2d7a0403dacbf5723b3e13bdd7dd40d628c00678feaf5f86b2a5cbe3d947cbcd23c3fa5bb04d
-
SSDEEP
24576:2FTqADbP4qXsZejCxQZPUQz/neABpcIssX0viImQG:ETvgqcZnQRUQbeAvcIhGi
-
Darkcomet family
-
Modifies firewall policy service
-
UAC bypass
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
2Disable or Modify Tools
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1