General
-
Target
051934711120beb60bd299a7e133e3c1_JaffaCakes118
-
Size
270KB
-
Sample
240428-npwcyseh7z
-
MD5
051934711120beb60bd299a7e133e3c1
-
SHA1
4a6cb4af8651c42cdb0b9a276bfd05ff502f5255
-
SHA256
7bc0f4e51796df68892ee16a279b6706e88f87809389641075e2a5cd76c1323c
-
SHA512
186956ec094809b020175e9b916ddec01ec89636dbecac2e5dfbda885fbcfdb19a76f1279ac4fc7714a71175f05309c8814d156275c100e7ae9f1d832b51dc06
-
SSDEEP
6144:8go5W9fsHQFsHjZK43aPFqXRFRTy4zBS1R/1SN:8go5OUOSK43PBTBzBS1R/1E
Static task
static1
Behavioral task
behavioral1
Sample
051934711120beb60bd299a7e133e3c1_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Extracted
lokibot
http://mclhk-net.com/hiswounds/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
051934711120beb60bd299a7e133e3c1_JaffaCakes118
-
Size
270KB
-
MD5
051934711120beb60bd299a7e133e3c1
-
SHA1
4a6cb4af8651c42cdb0b9a276bfd05ff502f5255
-
SHA256
7bc0f4e51796df68892ee16a279b6706e88f87809389641075e2a5cd76c1323c
-
SHA512
186956ec094809b020175e9b916ddec01ec89636dbecac2e5dfbda885fbcfdb19a76f1279ac4fc7714a71175f05309c8814d156275c100e7ae9f1d832b51dc06
-
SSDEEP
6144:8go5W9fsHQFsHjZK43aPFqXRFRTy4zBS1R/1SN:8go5OUOSK43PBTBzBS1R/1E
-
Modifies firewall policy service
-
Accesses Microsoft Outlook profiles
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5