General
-
Target
f4002e864efc7fdc01081492117806fa_JaffaCakes118
-
Size
147KB
-
Sample
240924-tf6efsvhmf
-
MD5
f4002e864efc7fdc01081492117806fa
-
SHA1
7ec7f64513d5d7c299505e1045ac39c3f136d32e
-
SHA256
73069a8737f75c75eb013249849058eb0a4f679eb67cb93921087e082cd46df5
-
SHA512
95ee1e0a4fac3a25f7f4e0251e38f547c7403ab57ee30c1bf2f9314739de278514c8648177318186691bf5aa9c44dcc0dbf67430d84857398db15066ab5fe282
-
SSDEEP
3072:J3PaY2u3HzkYw3P6d00+e3DUmT/+DHnW0EdndYtvxQa/5gxMo31xGPI84t0x:hPaYj3T43I00+iUrDH1QtH3vWEI
Behavioral task
behavioral1
Sample
f4002e864efc7fdc01081492117806fa_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4002e864efc7fdc01081492117806fa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
f4002e864efc7fdc01081492117806fa_JaffaCakes118
-
Size
147KB
-
MD5
f4002e864efc7fdc01081492117806fa
-
SHA1
7ec7f64513d5d7c299505e1045ac39c3f136d32e
-
SHA256
73069a8737f75c75eb013249849058eb0a4f679eb67cb93921087e082cd46df5
-
SHA512
95ee1e0a4fac3a25f7f4e0251e38f547c7403ab57ee30c1bf2f9314739de278514c8648177318186691bf5aa9c44dcc0dbf67430d84857398db15066ab5fe282
-
SSDEEP
3072:J3PaY2u3HzkYw3P6d00+e3DUmT/+DHnW0EdndYtvxQa/5gxMo31xGPI84t0x:hPaYj3T43I00+iUrDH1QtH3vWEI
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7