General
-
Target
e276b13a012ff4728e11a0c1f797ff3d_JaffaCakes118
-
Size
100KB
-
Sample
240915-pf2daatalf
-
MD5
e276b13a012ff4728e11a0c1f797ff3d
-
SHA1
f0685ed1d5b5316c6dc02300140771b9f718efbd
-
SHA256
631ee7aa84d031f46f08b806c855a87e4510f86b9ec7c346a729c63c07e6a878
-
SHA512
dc2db649683f0af36e9842c896616ef0ae9ae1f81e6c7a39ac7fe032b920bf6ee49dc11c8329141b11722a4a5a523645eed46b96e9e94160ced69e5752c0687f
-
SSDEEP
3072:U35Z1uEsf9kCGFZRu00TTKudMssTYpJ+W5:UljsfmJjRziuLr/
Static task
static1
Behavioral task
behavioral1
Sample
e276b13a012ff4728e11a0c1f797ff3d_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
e276b13a012ff4728e11a0c1f797ff3d_JaffaCakes118
-
Size
100KB
-
MD5
e276b13a012ff4728e11a0c1f797ff3d
-
SHA1
f0685ed1d5b5316c6dc02300140771b9f718efbd
-
SHA256
631ee7aa84d031f46f08b806c855a87e4510f86b9ec7c346a729c63c07e6a878
-
SHA512
dc2db649683f0af36e9842c896616ef0ae9ae1f81e6c7a39ac7fe032b920bf6ee49dc11c8329141b11722a4a5a523645eed46b96e9e94160ced69e5752c0687f
-
SSDEEP
3072:U35Z1uEsf9kCGFZRu00TTKudMssTYpJ+W5:UljsfmJjRziuLr/
-
Modifies firewall policy service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5