General
-
Target
JaffaCakes118_b972533e1d6e20b55a10bc2f11bd1c8d
-
Size
728KB
-
Sample
250415-hf2kqayqz7
-
MD5
b972533e1d6e20b55a10bc2f11bd1c8d
-
SHA1
37145911c18b6f65e6879771c2caaf7772081378
-
SHA256
30c0b480c6ea96f1c4964f4b228b9f9e05bdb93f552a63d8d4c78412ae1a2700
-
SHA512
966ec64ea77d103a1d561bd0eb0ce20399f164c8d95364b6e6544a45498a2b3fb56150a33175c2dad52252e57f3fc69746ee649770e392a2bca705eb4d76d60e
-
SSDEEP
12288:tK2IV1diFZ08/H0jPB1BCv/o7F0lYWdsDdILCfqjZA+Hdpix94AiYJpIoFsZyGW:t0VTG5/He/BCnEeYlDdIL2qNA+biP4He
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b972533e1d6e20b55a10bc2f11bd1c8d.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
darkcomet
Guest16
amoresperros.zapto.org:1604
DC_MUTEX-Q3P2EXK
-
InstallPath
Windupdt\winupdate.exe
-
gencode
lDDSRnGWjg.j
-
install
true
-
offline_keylogger
false
-
persistence
true
-
reg_key
winupdater
Extracted
latentbot
amoresperros.zapto.org
Targets
-
-
Target
JaffaCakes118_b972533e1d6e20b55a10bc2f11bd1c8d
-
Size
728KB
-
MD5
b972533e1d6e20b55a10bc2f11bd1c8d
-
SHA1
37145911c18b6f65e6879771c2caaf7772081378
-
SHA256
30c0b480c6ea96f1c4964f4b228b9f9e05bdb93f552a63d8d4c78412ae1a2700
-
SHA512
966ec64ea77d103a1d561bd0eb0ce20399f164c8d95364b6e6544a45498a2b3fb56150a33175c2dad52252e57f3fc69746ee649770e392a2bca705eb4d76d60e
-
SSDEEP
12288:tK2IV1diFZ08/H0jPB1BCv/o7F0lYWdsDdILCfqjZA+Hdpix94AiYJpIoFsZyGW:t0VTG5/He/BCnEeYlDdIL2qNA+biP4He
-
Darkcomet family
-
Latentbot family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Windows security bypass
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
6