General
-
Target
JaffaCakes118_bc5e9d6c42c4a7a8f3e399628b35edc6
-
Size
792KB
-
Sample
250418-dzxnnasrx2
-
MD5
bc5e9d6c42c4a7a8f3e399628b35edc6
-
SHA1
89467555b70aa69a09f2a9b6068d851bc6da3730
-
SHA256
37f71d92f06d6db3a5660d2029e0828277f5970942554372c0405eeb5daec278
-
SHA512
f85ba3ccf4a76412a53d286b8dd6ab02feca4736c27e2b5a6ed6b158543bf5780ceef3c213613727f0b9ddeb267bb5ad1bb79fc70ecc5c2610c7b0ec9624d5ff
-
SSDEEP
24576:XlvYrG9qagUztjgUVWdxfYEbKQZ87bqeA4L9j/A:eK9qagUO2wO7bXA4
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bc5e9d6c42c4a7a8f3e399628b35edc6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bc5e9d6c42c4a7a8f3e399628b35edc6.exe
Resource
win11-20250410-en
Malware Config
Extracted
darkcomet
Mooose
masha.zapto.org:1604
DC_MUTEX-9HH2WSZ
-
InstallPath
Windupdt\winupdate.exe
-
gencode
iUjv.BRt=lEN
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
winupdater
Targets
-
-
Target
JaffaCakes118_bc5e9d6c42c4a7a8f3e399628b35edc6
-
Size
792KB
-
MD5
bc5e9d6c42c4a7a8f3e399628b35edc6
-
SHA1
89467555b70aa69a09f2a9b6068d851bc6da3730
-
SHA256
37f71d92f06d6db3a5660d2029e0828277f5970942554372c0405eeb5daec278
-
SHA512
f85ba3ccf4a76412a53d286b8dd6ab02feca4736c27e2b5a6ed6b158543bf5780ceef3c213613727f0b9ddeb267bb5ad1bb79fc70ecc5c2610c7b0ec9624d5ff
-
SSDEEP
24576:XlvYrG9qagUztjgUVWdxfYEbKQZ87bqeA4L9j/A:eK9qagUO2wO7bXA4
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Windows security bypass
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Windows security modification
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
5