General
-
Target
f1788c80c2683c09fb9886d4e6173f2b_JaffaCakes118
-
Size
119KB
-
Sample
240415-trpwvada2y
-
MD5
f1788c80c2683c09fb9886d4e6173f2b
-
SHA1
ff283ee6674545b8edacddb13d3512c8f47a015b
-
SHA256
5b3286ea7821e9f5edfaea416f2f8eeae19eaf680517478ae73a1db2314100b9
-
SHA512
97e4bd23eb4cfdc02c5598a4064def4657461d0bf686673e6a76008272981b327e7f2bb4d2fcdac2f89ec64ebc2ab6772a6ca6f0d4e3d714b1f295b729eefb52
-
SSDEEP
3072:1niig7Jgt8EspeU2+5CJ2juXLdXfvubruced9sfTh3rg5o+p2rw5Y:1nir7Jgt8EspzR62jyXfviuct7NG
Static task
static1
Behavioral task
behavioral1
Sample
f1788c80c2683c09fb9886d4e6173f2b_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
f1788c80c2683c09fb9886d4e6173f2b_JaffaCakes118
-
Size
119KB
-
MD5
f1788c80c2683c09fb9886d4e6173f2b
-
SHA1
ff283ee6674545b8edacddb13d3512c8f47a015b
-
SHA256
5b3286ea7821e9f5edfaea416f2f8eeae19eaf680517478ae73a1db2314100b9
-
SHA512
97e4bd23eb4cfdc02c5598a4064def4657461d0bf686673e6a76008272981b327e7f2bb4d2fcdac2f89ec64ebc2ab6772a6ca6f0d4e3d714b1f295b729eefb52
-
SSDEEP
3072:1niig7Jgt8EspeU2+5CJ2juXLdXfvubruced9sfTh3rg5o+p2rw5Y:1nir7Jgt8EspzR62jyXfviuct7NG
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5