General
-
Target
11048c42483717ab9c2858214e06cc88_JaffaCakes118
-
Size
100KB
-
Sample
240626-g5l1wssfkq
-
MD5
11048c42483717ab9c2858214e06cc88
-
SHA1
8cce96e76bcb241b9448c4cbfe65f0be7af2e5f9
-
SHA256
6e8586028b45f217cd50763770e416a449f45b6bc4bff466557016f24559b800
-
SHA512
ca768c7b73787c679f411ca95facbb65c1e564c01c0591b2fc62b33ff8a20a454234c85b63f2896cf1b65447abd3d56b0b4183723f4e220ea3bb01c343016523
-
SSDEEP
1536:C3/swwmBZonqwAnlSCDodIuV7A8jdhZ6LzS4c4sYXI0glEqLNJ0IRi1ASrPY:4sMwAnlLDouu5dhaSFoI0glFL0IIlPY
Static task
static1
Behavioral task
behavioral1
Sample
11048c42483717ab9c2858214e06cc88_JaffaCakes118.exe
Resource
win7-20240419-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
11048c42483717ab9c2858214e06cc88_JaffaCakes118
-
Size
100KB
-
MD5
11048c42483717ab9c2858214e06cc88
-
SHA1
8cce96e76bcb241b9448c4cbfe65f0be7af2e5f9
-
SHA256
6e8586028b45f217cd50763770e416a449f45b6bc4bff466557016f24559b800
-
SHA512
ca768c7b73787c679f411ca95facbb65c1e564c01c0591b2fc62b33ff8a20a454234c85b63f2896cf1b65447abd3d56b0b4183723f4e220ea3bb01c343016523
-
SSDEEP
1536:C3/swwmBZonqwAnlSCDodIuV7A8jdhZ6LzS4c4sYXI0glEqLNJ0IRi1ASrPY:4sMwAnlLDouu5dhaSFoI0glFL0IIlPY
-
Modifies firewall policy service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5