General
-
Target
JaffaCakes118_929f77a47a4a33455ccdb7366ef0ff98
-
Size
899KB
-
Sample
250329-xeasyawmz4
-
MD5
929f77a47a4a33455ccdb7366ef0ff98
-
SHA1
38b8140d139c212b12ac4fbef64a339da3a50af9
-
SHA256
cca77ef16e89bff979f6abf9b435cf7c433f664f6003648a4645530c37a857a4
-
SHA512
8cab77bc38be2aca1ded368a3ffac1f56d21351ea24c0271daf0b11d833d0e120c9a2be9061248aa951cb268efdf7b42aa157bc54415e7f6154475ad22835488
-
SSDEEP
12288:EdQyETqOIG8u8IaPowniyjkRmFm9fMVa5t3OYyd0kf5jkJxL1XWkGl4IsGikcDho:EdQuOIG8gsTo3N3OYif5jOWkwtsBxmH
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_929f77a47a4a33455ccdb7366ef0ff98.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_929f77a47a4a33455ccdb7366ef0ff98.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
darkcomet
O0ziil
dylz-h4ck.no-ip.org:1324
DC_MUTEX-09AT1EJ
-
InstallPath
system32/winlogon.exe
-
gencode
wM-hxmeQDf2%
-
install
true
-
offline_keylogger
true
-
password
dinounou
-
persistence
true
-
reg_key
winlogon
Targets
-
-
Target
JaffaCakes118_929f77a47a4a33455ccdb7366ef0ff98
-
Size
899KB
-
MD5
929f77a47a4a33455ccdb7366ef0ff98
-
SHA1
38b8140d139c212b12ac4fbef64a339da3a50af9
-
SHA256
cca77ef16e89bff979f6abf9b435cf7c433f664f6003648a4645530c37a857a4
-
SHA512
8cab77bc38be2aca1ded368a3ffac1f56d21351ea24c0271daf0b11d833d0e120c9a2be9061248aa951cb268efdf7b42aa157bc54415e7f6154475ad22835488
-
SSDEEP
12288:EdQyETqOIG8u8IaPowniyjkRmFm9fMVa5t3OYyd0kf5jkJxL1XWkGl4IsGikcDho:EdQuOIG8gsTo3N3OYif5jOWkwtsBxmH
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Windows security bypass
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables Task Manager via registry modification
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
8