General
-
Target
f034e64039d2d72d14f94c7d6826d493_JaffaCakes118
-
Size
123KB
-
Sample
240921-t5balssfjp
-
MD5
f034e64039d2d72d14f94c7d6826d493
-
SHA1
4465413ed4a98564c625ff944264e553e16f5413
-
SHA256
1935e4bb698dbedbc123eb3c7e0465ee74dbc77cf99e526c5a91babb23cda9bb
-
SHA512
69aa88514d3d59a65e804a4cfd55b45ef045b7a3120c8ddb5cf16c7ea08a6621f371b4e6b50015ddab75b792670312d0354184c0bc7dfd78dca758854736506c
-
SSDEEP
3072:bkdjlbfpbo19yTxhaDxc8fDxqF9sqBQMb1XHEX+mwzjAE7:bKS9yTxmZtqF9svWHfzzjAE7
Behavioral task
behavioral1
Sample
f034e64039d2d72d14f94c7d6826d493_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
f034e64039d2d72d14f94c7d6826d493_JaffaCakes118
-
Size
123KB
-
MD5
f034e64039d2d72d14f94c7d6826d493
-
SHA1
4465413ed4a98564c625ff944264e553e16f5413
-
SHA256
1935e4bb698dbedbc123eb3c7e0465ee74dbc77cf99e526c5a91babb23cda9bb
-
SHA512
69aa88514d3d59a65e804a4cfd55b45ef045b7a3120c8ddb5cf16c7ea08a6621f371b4e6b50015ddab75b792670312d0354184c0bc7dfd78dca758854736506c
-
SSDEEP
3072:bkdjlbfpbo19yTxhaDxc8fDxqF9sqBQMb1XHEX+mwzjAE7:bKS9yTxmZtqF9svWHfzzjAE7
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5