General
-
Target
dbd727c22f7ea5e5f3c588faa6d5f7e8_JaffaCakes118
-
Size
100KB
-
Sample
240912-fgbpkssbmf
-
MD5
dbd727c22f7ea5e5f3c588faa6d5f7e8
-
SHA1
2d63fee71f5033c20b5971d11672a74bb574fe4c
-
SHA256
227fca72d61567a9261a9d8f093b52cdbfc9e5047973efbc48a99b69c86a5272
-
SHA512
bb661b22c572d8f6d56e5ca47f83a364b92216147e1d243992adedcc3b0376173684f5aaa9b5f281c3e73fba69469f94d3c2d1275e99357c5a200648b46125c9
-
SSDEEP
3072:jVXSqHTfb0cge17lr/9A9dYfZl3kax099A:jsK1re0fZ5G0
Static task
static1
Behavioral task
behavioral1
Sample
dbd727c22f7ea5e5f3c588faa6d5f7e8_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
dbd727c22f7ea5e5f3c588faa6d5f7e8_JaffaCakes118
-
Size
100KB
-
MD5
dbd727c22f7ea5e5f3c588faa6d5f7e8
-
SHA1
2d63fee71f5033c20b5971d11672a74bb574fe4c
-
SHA256
227fca72d61567a9261a9d8f093b52cdbfc9e5047973efbc48a99b69c86a5272
-
SHA512
bb661b22c572d8f6d56e5ca47f83a364b92216147e1d243992adedcc3b0376173684f5aaa9b5f281c3e73fba69469f94d3c2d1275e99357c5a200648b46125c9
-
SSDEEP
3072:jVXSqHTfb0cge17lr/9A9dYfZl3kax099A:jsK1re0fZ5G0
-
Modifies firewall policy service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5