General
-
Target
JaffaCakes118_c111819eab30850f1a2b0013c13ed599
-
Size
22.1MB
-
Sample
250419-d2ynqswkt9
-
MD5
c111819eab30850f1a2b0013c13ed599
-
SHA1
ddf9d444ee4914194798a2a6fe6b39795f54eabc
-
SHA256
6e4c943d59d7c9ae951de1e14f35a47af766be7cb2680b6915ae9713b5eb2887
-
SHA512
cd5a0902cab21d90aa14e9c344b68cade4710922f8ddd30a8c204bbc941418c8e9ea45a0341dfd0504226b52206e167ae9580d18894517748285c5882a73c37b
-
SSDEEP
24576:BWc7SR2xuGBRBgOiULNFOAL+ToFZxvYR:BWVR2MrOiUh8LME
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c111819eab30850f1a2b0013c13ed599.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
darkcomet
Guest16
cr4nk1337.no-ip.org:1337
DC_MUTEX-7XE7939
-
InstallPath
Windupdt\winupdate.exe
-
gencode
9s�5H0iQeqv.
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
winupdater
Targets
-
-
Target
JaffaCakes118_c111819eab30850f1a2b0013c13ed599
-
Size
22.1MB
-
MD5
c111819eab30850f1a2b0013c13ed599
-
SHA1
ddf9d444ee4914194798a2a6fe6b39795f54eabc
-
SHA256
6e4c943d59d7c9ae951de1e14f35a47af766be7cb2680b6915ae9713b5eb2887
-
SHA512
cd5a0902cab21d90aa14e9c344b68cade4710922f8ddd30a8c204bbc941418c8e9ea45a0341dfd0504226b52206e167ae9580d18894517748285c5882a73c37b
-
SSDEEP
24576:BWc7SR2xuGBRBgOiULNFOAL+ToFZxvYR:BWVR2MrOiUh8LME
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1