General
-
Target
13b0d6aa2cf92231a188c8e5888d44cc_JaffaCakes118
-
Size
100KB
-
Sample
241004-rkpamaycqr
-
MD5
13b0d6aa2cf92231a188c8e5888d44cc
-
SHA1
35f8db2944b758f2e080da7cf6838e550dedd6c1
-
SHA256
833868bdd9cbe61de20ff8be45ebf708e9903ae7435a6ec70542e17f938ed621
-
SHA512
9d86b247fb623a1dea6b29cbba6c89f5b1d3006fa44806593cfc05e82b89174211856c48324b1107c0147ffaeb90d1093c89764607c6c68b3f7d92c9e51f2713
-
SSDEEP
1536:UflPOAPSim5HAXl59uwLDsaVMCQ1G8JzELILlbczlXP/dCOihV+y3:UZ0bg15Qw3JqY8JzELYSlXP/dClP
Static task
static1
Behavioral task
behavioral1
Sample
13b0d6aa2cf92231a188c8e5888d44cc_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
13b0d6aa2cf92231a188c8e5888d44cc_JaffaCakes118
-
Size
100KB
-
MD5
13b0d6aa2cf92231a188c8e5888d44cc
-
SHA1
35f8db2944b758f2e080da7cf6838e550dedd6c1
-
SHA256
833868bdd9cbe61de20ff8be45ebf708e9903ae7435a6ec70542e17f938ed621
-
SHA512
9d86b247fb623a1dea6b29cbba6c89f5b1d3006fa44806593cfc05e82b89174211856c48324b1107c0147ffaeb90d1093c89764607c6c68b3f7d92c9e51f2713
-
SSDEEP
1536:UflPOAPSim5HAXl59uwLDsaVMCQ1G8JzELILlbczlXP/dCOihV+y3:UZ0bg15Qw3JqY8JzELYSlXP/dClP
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5