General
-
Target
fce3e2274c2d06fe2e10e5f5c492d93d_JaffaCakes118
-
Size
851KB
-
Sample
240928-w3l1fazdjm
-
MD5
fce3e2274c2d06fe2e10e5f5c492d93d
-
SHA1
7acfd8f04490fcc524d3db32026718bf3f15f663
-
SHA256
6f68e9504b620b6f04078e1e696a429d2757647f35101276af3de93f9042fe81
-
SHA512
304943e12f29cc05fa97718f50ed01eca4e99ff6d46531b1e1fbedf272d655c3e5520c1acc649d7008ff59f04ddb85abd015160e667367c7d8394c6d71c469a1
-
SSDEEP
12288:BMoVefu+XY93VM/6sSISPehPEYDxGhhkZEZivnNxaT0Iw5pkd3DUe/:BMPfuZMSsNN9GTmEsnlc5DUe/
Static task
static1
Behavioral task
behavioral1
Sample
fce3e2274c2d06fe2e10e5f5c492d93d_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
fce3e2274c2d06fe2e10e5f5c492d93d_JaffaCakes118
-
Size
851KB
-
MD5
fce3e2274c2d06fe2e10e5f5c492d93d
-
SHA1
7acfd8f04490fcc524d3db32026718bf3f15f663
-
SHA256
6f68e9504b620b6f04078e1e696a429d2757647f35101276af3de93f9042fe81
-
SHA512
304943e12f29cc05fa97718f50ed01eca4e99ff6d46531b1e1fbedf272d655c3e5520c1acc649d7008ff59f04ddb85abd015160e667367c7d8394c6d71c469a1
-
SSDEEP
12288:BMoVefu+XY93VM/6sSISPehPEYDxGhhkZEZivnNxaT0Iw5pkd3DUe/:BMPfuZMSsNN9GTmEsnlc5DUe/
-
Modifies firewall policy service
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6