General
-
Target
69eb2997d3bfe12e95f034621e4e280e_JaffaCakes118
-
Size
447KB
-
Sample
240724-cxt93swdre
-
MD5
69eb2997d3bfe12e95f034621e4e280e
-
SHA1
355dcfedf659a2aa4b3b101f2b0a1fbfbcda3ab1
-
SHA256
94c657f4c9a052bc2eaa2a11a708115bf4ce425ed5857ea5febbf34539a13feb
-
SHA512
3a7ec56cc1268bfa2f28625d43a9e6a21bac716a8e3aad54ddea4bbaa5ad6f9bd24d7dda826fc43c334d4696401fd86a7f608da1839cf14402105b0c86c16039
-
SSDEEP
6144:PtMG0/QDWD3vpT/n3VLNhCyfkA1O4elpr/rere9cyzUykBx:6QSD5P3785AY4e7rKrFyQykBx
Static task
static1
Behavioral task
behavioral1
Sample
69eb2997d3bfe12e95f034621e4e280e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
69eb2997d3bfe12e95f034621e4e280e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
69eb2997d3bfe12e95f034621e4e280e_JaffaCakes118
-
Size
447KB
-
MD5
69eb2997d3bfe12e95f034621e4e280e
-
SHA1
355dcfedf659a2aa4b3b101f2b0a1fbfbcda3ab1
-
SHA256
94c657f4c9a052bc2eaa2a11a708115bf4ce425ed5857ea5febbf34539a13feb
-
SHA512
3a7ec56cc1268bfa2f28625d43a9e6a21bac716a8e3aad54ddea4bbaa5ad6f9bd24d7dda826fc43c334d4696401fd86a7f608da1839cf14402105b0c86c16039
-
SSDEEP
6144:PtMG0/QDWD3vpT/n3VLNhCyfkA1O4elpr/rere9cyzUykBx:6QSD5P3785AY4e7rKrFyQykBx
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5