General
-
Target
6db6d12e5dbc839b9c6858444a165bd4_JaffaCakes118
-
Size
244KB
-
Sample
240524-h3kkqahe81
-
MD5
6db6d12e5dbc839b9c6858444a165bd4
-
SHA1
d17c5d289b884ea452d9cf0ca921ce6e4f498831
-
SHA256
0ba6c143dea468a85bac811af2fd4b6c62a59c3530a15ab0fdd1099ef27edaa8
-
SHA512
643f6f8a6b0e8509e43d1346102c028eda7df8275ee63975de71bc0a9ee93730c53b893fd799989f6c11cd44ab705e596b23a94af2281f8818d8700a1818868a
-
SSDEEP
3072:JmdrXoGCHt4JTKkZfLTuvfFo2mP1HniQdnAAMMoNH+TQYb8rbtXIGxsDSZLbRhG+:JmdZOi5gu9Pl8FHmQLrbJzSDaLFYoZW
Static task
static1
Behavioral task
behavioral1
Sample
6db6d12e5dbc839b9c6858444a165bd4_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
6db6d12e5dbc839b9c6858444a165bd4_JaffaCakes118
-
Size
244KB
-
MD5
6db6d12e5dbc839b9c6858444a165bd4
-
SHA1
d17c5d289b884ea452d9cf0ca921ce6e4f498831
-
SHA256
0ba6c143dea468a85bac811af2fd4b6c62a59c3530a15ab0fdd1099ef27edaa8
-
SHA512
643f6f8a6b0e8509e43d1346102c028eda7df8275ee63975de71bc0a9ee93730c53b893fd799989f6c11cd44ab705e596b23a94af2281f8818d8700a1818868a
-
SSDEEP
3072:JmdrXoGCHt4JTKkZfLTuvfFo2mP1HniQdnAAMMoNH+TQYb8rbtXIGxsDSZLbRhG+:JmdZOi5gu9Pl8FHmQLrbJzSDaLFYoZW
-
Modifies firewall policy service
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6