General
-
Target
bb0629bffe0a84f6dd1b22d049abeda1_JaffaCakes118
-
Size
504KB
-
Sample
240823-kjdzyawgrr
-
MD5
bb0629bffe0a84f6dd1b22d049abeda1
-
SHA1
23d49a3037d7e1973c902e910fba95f1d2aa9867
-
SHA256
9dfd5347449fe838db215410737ed4306b47c58212494ac6b1ed1656dc1d3232
-
SHA512
47fc7de15e72699121f76229d18d1a8714e2a87966a3650be1994c5d91eabc369abd65468f226e0a06f26936795bd149b3e03277280ef2f19391e2af66e5e2b7
-
SSDEEP
6144:0A4eesTABuA8NGexMUQqv+Z/k2LVWFgVFoLEN4moVhHzUt0JUPcIvz:09eFkexMgH2IFgVFoLO4pFEEI
Static task
static1
Behavioral task
behavioral1
Sample
bb0629bffe0a84f6dd1b22d049abeda1_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
bb0629bffe0a84f6dd1b22d049abeda1_JaffaCakes118
-
Size
504KB
-
MD5
bb0629bffe0a84f6dd1b22d049abeda1
-
SHA1
23d49a3037d7e1973c902e910fba95f1d2aa9867
-
SHA256
9dfd5347449fe838db215410737ed4306b47c58212494ac6b1ed1656dc1d3232
-
SHA512
47fc7de15e72699121f76229d18d1a8714e2a87966a3650be1994c5d91eabc369abd65468f226e0a06f26936795bd149b3e03277280ef2f19391e2af66e5e2b7
-
SSDEEP
6144:0A4eesTABuA8NGexMUQqv+Z/k2LVWFgVFoLEN4moVhHzUt0JUPcIvz:09eFkexMgH2IFgVFoLO4pFEEI
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5