General
-
Target
000fb14e2684eec0e2390f4ac64e8ff6_JaffaCakes118
-
Size
120KB
-
Sample
240619-xmn1ja1grm
-
MD5
000fb14e2684eec0e2390f4ac64e8ff6
-
SHA1
729bd474da00768b6146359797f647243d58abcb
-
SHA256
7c366b4af1dc388215e1184dcd95be84b8dc87b83f6570b1acf941e98ef8f694
-
SHA512
7b1b45d6b6b091785f4352bc327b171ed8cddbf21e9f7aecf9e8599c975f5e7bced9c462b713d8a7f0e6e3b2c35673b96396dbf61312fe9e44ad74700e8c2da7
-
SSDEEP
1536:kBhhDgty6cw7fi0WxrWIbmPqrJE5gt2AgRcRSe5dgRgDYH1QO1NQYglP5:kPhTk7K0kWIiS25LMSbmYVZ3Qlj
Static task
static1
Behavioral task
behavioral1
Sample
000fb14e2684eec0e2390f4ac64e8ff6_JaffaCakes118.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
000fb14e2684eec0e2390f4ac64e8ff6_JaffaCakes118
-
Size
120KB
-
MD5
000fb14e2684eec0e2390f4ac64e8ff6
-
SHA1
729bd474da00768b6146359797f647243d58abcb
-
SHA256
7c366b4af1dc388215e1184dcd95be84b8dc87b83f6570b1acf941e98ef8f694
-
SHA512
7b1b45d6b6b091785f4352bc327b171ed8cddbf21e9f7aecf9e8599c975f5e7bced9c462b713d8a7f0e6e3b2c35673b96396dbf61312fe9e44ad74700e8c2da7
-
SSDEEP
1536:kBhhDgty6cw7fi0WxrWIbmPqrJE5gt2AgRcRSe5dgRgDYH1QO1NQYglP5:kPhTk7K0kWIiS25LMSbmYVZ3Qlj
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1