General
-
Target
4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118
-
Size
2.4MB
-
Sample
240716-lpgtfswdpl
-
MD5
4dc3056d771e553df08b4f1fd1ec1c9c
-
SHA1
eb8c8106f5f86b0b28b803e73d2558c59072de8c
-
SHA256
9d8e918ee0cc27fa240659a022b23a542b83dae95bf86d341f89582f619b557c
-
SHA512
aa58ecebffb250cf749082098177e3de945e9c4e35e7674f6f7456fc7d48426d65a2be3d92390557dafc0781825ee4613dee84c7b7bbcd888da76d65736182d0
-
SSDEEP
49152:M0r+eSD+HTaRbHRAaLlzRIBrLbakBen7z4JA3iOCjLyGD0H/Mw:M0ZSDcOhNpqBrncou3i1m7
Static task
static1
Behavioral task
behavioral1
Sample
4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
4dc3056d771e553df08b4f1fd1ec1c9c_JaffaCakes118
-
Size
2.4MB
-
MD5
4dc3056d771e553df08b4f1fd1ec1c9c
-
SHA1
eb8c8106f5f86b0b28b803e73d2558c59072de8c
-
SHA256
9d8e918ee0cc27fa240659a022b23a542b83dae95bf86d341f89582f619b557c
-
SHA512
aa58ecebffb250cf749082098177e3de945e9c4e35e7674f6f7456fc7d48426d65a2be3d92390557dafc0781825ee4613dee84c7b7bbcd888da76d65736182d0
-
SSDEEP
49152:M0r+eSD+HTaRbHRAaLlzRIBrLbakBen7z4JA3iOCjLyGD0H/Mw:M0ZSDcOhNpqBrncou3i1m7
-
Detects Strela Stealer payload
-
Modifies firewall policy service
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5