General
-
Target
96faee621b3bd4b492fd7fe7656cab47_JaffaCakes118
-
Size
689KB
-
Sample
240814-vzmxwstgqa
-
MD5
96faee621b3bd4b492fd7fe7656cab47
-
SHA1
ae86bcc70b10e6f5486c6582a3a052ce1bb0a26c
-
SHA256
3db3bdab9b5bb686e68c2c4697b3c24be21ea3d9584da3c171211aefd5a59751
-
SHA512
92a426b7c1477156bfe21dc9d169abe692736b5a648c9dee6c270c7cd7766bf0b96fc2c610785b6296002f175a7a9130b2c007f86b255707c043c5d3a8167b94
-
SSDEEP
12288:4aA8GifKcqKCoVxug3YC5fva3I/zLmt6is6jgCLpcres/NSWW24H6t:4aA8GifKc1CoVUufi3I/zCt7jFarfEjQ
Static task
static1
Behavioral task
behavioral1
Sample
96faee621b3bd4b492fd7fe7656cab47_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
96faee621b3bd4b492fd7fe7656cab47_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
96faee621b3bd4b492fd7fe7656cab47_JaffaCakes118
-
Size
689KB
-
MD5
96faee621b3bd4b492fd7fe7656cab47
-
SHA1
ae86bcc70b10e6f5486c6582a3a052ce1bb0a26c
-
SHA256
3db3bdab9b5bb686e68c2c4697b3c24be21ea3d9584da3c171211aefd5a59751
-
SHA512
92a426b7c1477156bfe21dc9d169abe692736b5a648c9dee6c270c7cd7766bf0b96fc2c610785b6296002f175a7a9130b2c007f86b255707c043c5d3a8167b94
-
SSDEEP
12288:4aA8GifKcqKCoVxug3YC5fva3I/zLmt6is6jgCLpcres/NSWW24H6t:4aA8GifKc1CoVUufi3I/zCt7jFarfEjQ
-
Modifies firewall policy service
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5