General
-
Target
f5a27009403c8a5b151da7d36b29e4cb_JaffaCakes118
-
Size
97KB
-
Sample
240417-m926kach84
-
MD5
f5a27009403c8a5b151da7d36b29e4cb
-
SHA1
2f64d33453d063d8a3822444e7c1a04fd759a6ca
-
SHA256
a747d9ee46e2e99dd7f6afaf29add98443b1ec1f8c83be490ab1c08190a2b3f4
-
SHA512
7af02ec9342742239930b16660aa05306ae8280f2386a377a4df56f090b5d003dace306fcfa1fc7eace0dbd4c3e03c9da91f3889d9b8d47bae0cb70d8554f7d0
-
SSDEEP
1536:v/tidaiWZ8/Pzxek4F/e/RxdmT9LVSLXYgbNvWSw43etP1fVHzhiwlmMB:v2WZ8/l3dmT908gbMSzG1fzi
Static task
static1
Behavioral task
behavioral1
Sample
f5a27009403c8a5b151da7d36b29e4cb_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f5a27009403c8a5b151da7d36b29e4cb_JaffaCakes118
-
Size
97KB
-
MD5
f5a27009403c8a5b151da7d36b29e4cb
-
SHA1
2f64d33453d063d8a3822444e7c1a04fd759a6ca
-
SHA256
a747d9ee46e2e99dd7f6afaf29add98443b1ec1f8c83be490ab1c08190a2b3f4
-
SHA512
7af02ec9342742239930b16660aa05306ae8280f2386a377a4df56f090b5d003dace306fcfa1fc7eace0dbd4c3e03c9da91f3889d9b8d47bae0cb70d8554f7d0
-
SSDEEP
1536:v/tidaiWZ8/Pzxek4F/e/RxdmT9LVSLXYgbNvWSw43etP1fVHzhiwlmMB:v2WZ8/l3dmT908gbMSzG1fzi
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5