General
-
Target
1488dfd489ec0ca54b593f754d510b28_JaffaCakes118
-
Size
148KB
-
Sample
241004-xf3v4svcma
-
MD5
1488dfd489ec0ca54b593f754d510b28
-
SHA1
4f3065b1a8c2fdcec756e8e4db364707d91bfe04
-
SHA256
ae86ca65f1a343b006915ccd58ba0c59a80dc6f9960880f6c1b08ff8e0d75ebe
-
SHA512
a44649578b4b7705d217e9f7e5a338beb0df5a0d88fc229a13664a7a6c3a51f6d53b3ce63299c6ba2587977133c01037ffda620751c09ca3c9fa757cfabd5edb
-
SSDEEP
3072:0tkEoAWF4ZCD4OnYQqD844HEoKeB9N0yhsdeSEHUd1V0p+r2p/:0tkEoAM4iYQqA44k6BEzeSxdILB
Static task
static1
Behavioral task
behavioral1
Sample
1488dfd489ec0ca54b593f754d510b28_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1488dfd489ec0ca54b593f754d510b28_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
1488dfd489ec0ca54b593f754d510b28_JaffaCakes118
-
Size
148KB
-
MD5
1488dfd489ec0ca54b593f754d510b28
-
SHA1
4f3065b1a8c2fdcec756e8e4db364707d91bfe04
-
SHA256
ae86ca65f1a343b006915ccd58ba0c59a80dc6f9960880f6c1b08ff8e0d75ebe
-
SHA512
a44649578b4b7705d217e9f7e5a338beb0df5a0d88fc229a13664a7a6c3a51f6d53b3ce63299c6ba2587977133c01037ffda620751c09ca3c9fa757cfabd5edb
-
SSDEEP
3072:0tkEoAWF4ZCD4OnYQqD844HEoKeB9N0yhsdeSEHUd1V0p+r2p/:0tkEoAM4iYQqA44k6BEzeSxdILB
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
4