General
-
Target
7d6a08f1c4b78083a5c14b1f152cfa77_JaffaCakes118
-
Size
1.8MB
-
Sample
240528-slmc4ahh91
-
MD5
7d6a08f1c4b78083a5c14b1f152cfa77
-
SHA1
8b8a045dab5ab2fe8c0957bb3635b7e613c3615a
-
SHA256
22dc5c40df7e2e24da3b265555684c68072ff80862339d37751e203b6c2d8969
-
SHA512
20a5cbc4daa885888cf2e93be04d031b27168d1da9ec501d2550bbfa979870faea9152b1c5c1e34371fd21fcd028c4f608483e03b1ce202cffd909979a88d21d
-
SSDEEP
49152:08pWi3yXnPdRL0SuUYvxnrMnvDkP1DCkbtADtrZKZwy:bAnNuUYvxnwQ92icr8x
Static task
static1
Behavioral task
behavioral1
Sample
7d6a08f1c4b78083a5c14b1f152cfa77_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Extracted
pony
http://krungonline.com/wp-admin/css/Panel/gate.php
Targets
-
-
Target
7d6a08f1c4b78083a5c14b1f152cfa77_JaffaCakes118
-
Size
1.8MB
-
MD5
7d6a08f1c4b78083a5c14b1f152cfa77
-
SHA1
8b8a045dab5ab2fe8c0957bb3635b7e613c3615a
-
SHA256
22dc5c40df7e2e24da3b265555684c68072ff80862339d37751e203b6c2d8969
-
SHA512
20a5cbc4daa885888cf2e93be04d031b27168d1da9ec501d2550bbfa979870faea9152b1c5c1e34371fd21fcd028c4f608483e03b1ce202cffd909979a88d21d
-
SSDEEP
49152:08pWi3yXnPdRL0SuUYvxnrMnvDkP1DCkbtADtrZKZwy:bAnNuUYvxnwQ92icr8x
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5File and Directory Permissions Modification
1Subvert Trust Controls
1Install Root Certificate
1