General
-
Target
07ff01a5981a62f881098f91c9d8dc2a_JaffaCakes118
-
Size
827KB
-
Sample
240620-vhbtasxhph
-
MD5
07ff01a5981a62f881098f91c9d8dc2a
-
SHA1
05fcc7a610350324c40c9038db895f81efe1eb6f
-
SHA256
c8ceb7f27b3cedffabd4abaae3688b9b41d794f583ece6d7cb456a84f920aa8b
-
SHA512
2d70d118aee55051100485483724e194e9949e391d2420829288df9d362a59be1a26880ad419117f7f08d6b46c9754194110a177867976b40b7d1c217d499965
-
SSDEEP
24576:OA/sWp8oMJMCRcxNWdm1D43yT2ZWW4Dt9pYOtRtFtp:OA/+o85RcXWdmZdT294tXp
Static task
static1
Behavioral task
behavioral1
Sample
07ff01a5981a62f881098f91c9d8dc2a_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
07ff01a5981a62f881098f91c9d8dc2a_JaffaCakes118
-
Size
827KB
-
MD5
07ff01a5981a62f881098f91c9d8dc2a
-
SHA1
05fcc7a610350324c40c9038db895f81efe1eb6f
-
SHA256
c8ceb7f27b3cedffabd4abaae3688b9b41d794f583ece6d7cb456a84f920aa8b
-
SHA512
2d70d118aee55051100485483724e194e9949e391d2420829288df9d362a59be1a26880ad419117f7f08d6b46c9754194110a177867976b40b7d1c217d499965
-
SSDEEP
24576:OA/sWp8oMJMCRcxNWdm1D43yT2ZWW4Dt9pYOtRtFtp:OA/+o85RcXWdmZdT294tXp
-
Modifies firewall policy service
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7Pre-OS Boot
1Bootkit
1