General
-
Target
224db4bc8464a6bd9b68a1b84e709085_JaffaCakes118
-
Size
100KB
-
Sample
240703-n2r63asaqg
-
MD5
224db4bc8464a6bd9b68a1b84e709085
-
SHA1
83e2a6dbd76a2abfbbd441ddfa65353416a24e55
-
SHA256
41f0c1551469b985ac7d5b77ff0b0b1551c8131d2c8ce5bea1504a49f0023782
-
SHA512
bc6dcf0a526df0241b31c56a4209d839a448300f855e7bf9e3d59ffd20048bcc9438e7f7947cf3df26ec3d0dac5081d8710059e47a03f3850805891701f85456
-
SSDEEP
1536:OavcOvQFCbLG+uEIFCFunJ5oEvsstjLbaSbW2n6AWlPe:xTv3LD0CgnJDt/bfnqh
Static task
static1
Behavioral task
behavioral1
Sample
224db4bc8464a6bd9b68a1b84e709085_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
224db4bc8464a6bd9b68a1b84e709085_JaffaCakes118
-
Size
100KB
-
MD5
224db4bc8464a6bd9b68a1b84e709085
-
SHA1
83e2a6dbd76a2abfbbd441ddfa65353416a24e55
-
SHA256
41f0c1551469b985ac7d5b77ff0b0b1551c8131d2c8ce5bea1504a49f0023782
-
SHA512
bc6dcf0a526df0241b31c56a4209d839a448300f855e7bf9e3d59ffd20048bcc9438e7f7947cf3df26ec3d0dac5081d8710059e47a03f3850805891701f85456
-
SSDEEP
1536:OavcOvQFCbLG+uEIFCFunJ5oEvsstjLbaSbW2n6AWlPe:xTv3LD0CgnJDt/bfnqh
-
Modifies firewall policy service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5