General
-
Target
JaffaCakes118_bfe78d863289884c1eb72dd4c17ec33b
-
Size
1.3MB
-
Sample
250418-1q1qaawtcv
-
MD5
bfe78d863289884c1eb72dd4c17ec33b
-
SHA1
e004f1d015a7b3259bf1d412f9a01561d2ddc81c
-
SHA256
ca59df6efbf56fe0a4bdce6782ea7cb03a715e521ee9d1764f03255af0ca1630
-
SHA512
9ce57085c4f95b6e8237ac50bbd4cba78da8f49bc32620e820ec0a4f93725f69609fe00d8b11c0ad82cbf20effed5919a0aa69db62aacb37c565e89bd8bf3d57
-
SSDEEP
24576:aV0tD8gqyAHBXP8zcofDuDd0QSZgYpPVbOQE:+0l8TphkhqyXZvPMQE
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bfe78d863289884c1eb72dd4c17ec33b.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bfe78d863289884c1eb72dd4c17ec33b.exe
Resource
win11-20250410-en
Malware Config
Extracted
darkcomet
Opfer
panzaknacka.hopto.org:1337
9DQS7WD
-
InstallPath
MSDCSC\windriver.exe
-
gencode
GXt9PyrYl0Ye
-
install
true
-
offline_keylogger
true
-
password
twitch
-
persistence
false
-
reg_key
windriver
Targets
-
-
Target
JaffaCakes118_bfe78d863289884c1eb72dd4c17ec33b
-
Size
1.3MB
-
MD5
bfe78d863289884c1eb72dd4c17ec33b
-
SHA1
e004f1d015a7b3259bf1d412f9a01561d2ddc81c
-
SHA256
ca59df6efbf56fe0a4bdce6782ea7cb03a715e521ee9d1764f03255af0ca1630
-
SHA512
9ce57085c4f95b6e8237ac50bbd4cba78da8f49bc32620e820ec0a4f93725f69609fe00d8b11c0ad82cbf20effed5919a0aa69db62aacb37c565e89bd8bf3d57
-
SSDEEP
24576:aV0tD8gqyAHBXP8zcofDuDd0QSZgYpPVbOQE:+0l8TphkhqyXZvPMQE
-
Darkcomet family
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
Isrstealer family
-
Modifies WinLogon for persistence
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1