General
-
Target
f04861809694b1c8661a3adbfd11045d_JaffaCakes118
-
Size
368KB
-
Sample
240921-yca7csyhrg
-
MD5
f04861809694b1c8661a3adbfd11045d
-
SHA1
01dc81993524aded936f960a7ea60f152abd80c5
-
SHA256
da56ff6445214f6a37147898a55b6b3b2d4a83fa515ff213d45d550124f11c5e
-
SHA512
f5e6ae66743f6dd95afaf560cb7ed8a5896733ac37379cf59d9f5c118b0df8852cb9569735c209e65ff294769697a786542d8238bcf6ef3d42713ede8538d079
-
SSDEEP
6144:OYDhB6ActM8FbPt6a15RGkPNJAcb+k2WzoPiML3AYRYAe5mYkl5nm65jDDdgkeKH:p9BvctM85t35JPNJj2WzoRLQYRYzmYO9
Behavioral task
behavioral1
Sample
f04861809694b1c8661a3adbfd11045d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f04861809694b1c8661a3adbfd11045d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f04861809694b1c8661a3adbfd11045d_JaffaCakes118
-
Size
368KB
-
MD5
f04861809694b1c8661a3adbfd11045d
-
SHA1
01dc81993524aded936f960a7ea60f152abd80c5
-
SHA256
da56ff6445214f6a37147898a55b6b3b2d4a83fa515ff213d45d550124f11c5e
-
SHA512
f5e6ae66743f6dd95afaf560cb7ed8a5896733ac37379cf59d9f5c118b0df8852cb9569735c209e65ff294769697a786542d8238bcf6ef3d42713ede8538d079
-
SSDEEP
6144:OYDhB6ActM8FbPt6a15RGkPNJAcb+k2WzoPiML3AYRYAe5mYkl5nm65jDDdgkeKH:p9BvctM85t35JPNJj2WzoRLQYRYzmYO9
-
Modifies WinLogon for persistence
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Account Manipulation
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
8