General
-
Target
5d0306f6de82a3cd770ded364f20fbc6_JaffaCakes118
-
Size
15.6MB
-
Sample
240520-eajwyaab37
-
MD5
5d0306f6de82a3cd770ded364f20fbc6
-
SHA1
82833e61df320916bf95913a431cc465c126baef
-
SHA256
cd0f4cb2c9e9f76283d4c9ef202ec97df9e8992ce3f00ef2f062403f8b1240ce
-
SHA512
bd278637f05eaa9afac35fdd0877d84fa6b1873242cec556e8d2f0623f066654f85158f2e5475759d2d272fa6f57e6c169077df228cbde2ddc2ea440dfbee137
-
SSDEEP
393216:HE5f2iHrVdaVckr23JLgYvQJTq898+n1C5HjZdkRYI:HEsiHr/cbrILVwPWUcHjZqYI
Static task
static1
Behavioral task
behavioral1
Sample
5d0306f6de82a3cd770ded364f20fbc6_JaffaCakes118.exe
Resource
win7-20240220-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
5d0306f6de82a3cd770ded364f20fbc6_JaffaCakes118
-
Size
15.6MB
-
MD5
5d0306f6de82a3cd770ded364f20fbc6
-
SHA1
82833e61df320916bf95913a431cc465c126baef
-
SHA256
cd0f4cb2c9e9f76283d4c9ef202ec97df9e8992ce3f00ef2f062403f8b1240ce
-
SHA512
bd278637f05eaa9afac35fdd0877d84fa6b1873242cec556e8d2f0623f066654f85158f2e5475759d2d272fa6f57e6c169077df228cbde2ddc2ea440dfbee137
-
SSDEEP
393216:HE5f2iHrVdaVckr23JLgYvQJTq898+n1C5HjZdkRYI:HEsiHr/cbrILVwPWUcHjZqYI
-
Modifies firewall policy service
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5