General
-
Target
JaffaCakes118_9069fa248edbd51b9843512162454a21
-
Size
1.8MB
-
Sample
250329-wsvvlaxsbt
-
MD5
9069fa248edbd51b9843512162454a21
-
SHA1
523ba0b8402e82e1686e38ba53f8c76fd77565e6
-
SHA256
27c5ea836ffb52bf22df29e039b102a7f1a402ff3e0d7a6925a628999fe575a2
-
SHA512
f6b3b9bc5b262d47f366763045d3f2fc166bd6a7140f70599c9cab94106643f4071784618d5f58c95490bc2fb60bcca0b61f859a415d7d19ce21347125537899
-
SSDEEP
12288:s64Kj0aD6XuBq9LZZwnIOGyU2FeAN6Ypbf1qAm0gW7SllD6WKFGv8X34G4OjcIps:36+cSFt5SWGycIjgH0HZsVQN6
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9069fa248edbd51b9843512162454a21.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9069fa248edbd51b9843512162454a21.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
darkcomet
Guest16
servicedevice.no-ip.org:1232
DC_MUTEX-2T9L5UJ
-
InstallPath
MSoft\smss.exe
-
gencode
j6TrhCffXJTX
-
install
true
-
offline_keylogger
true
-
password
123456789
-
persistence
false
-
reg_key
Microsoft � Co- operation �
Targets
-
-
Target
JaffaCakes118_9069fa248edbd51b9843512162454a21
-
Size
1.8MB
-
MD5
9069fa248edbd51b9843512162454a21
-
SHA1
523ba0b8402e82e1686e38ba53f8c76fd77565e6
-
SHA256
27c5ea836ffb52bf22df29e039b102a7f1a402ff3e0d7a6925a628999fe575a2
-
SHA512
f6b3b9bc5b262d47f366763045d3f2fc166bd6a7140f70599c9cab94106643f4071784618d5f58c95490bc2fb60bcca0b61f859a415d7d19ce21347125537899
-
SSDEEP
12288:s64Kj0aD6XuBq9LZZwnIOGyU2FeAN6Ypbf1qAm0gW7SllD6WKFGv8X34G4OjcIps:36+cSFt5SWGycIjgH0HZsVQN6
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
3