General
-
Target
3af6d6f0b294376ac7279228622ac9d6_JaffaCakes118
-
Size
100KB
-
Sample
241012-ttbr1atenn
-
MD5
3af6d6f0b294376ac7279228622ac9d6
-
SHA1
1ef27dbbad052308f96be823e807ae3b32d1b435
-
SHA256
e4c8e18cae066812ca0d6eada8ee73077832a68cf5dde7ebd603308531e60be9
-
SHA512
e97af6991b238fc5a6d4dbc0258b1bb6659592f5f13559edfd498b37c72a88e522d3cdb074318e527b61e7b31421c583378532abc3a6d84d02c277369460b177
-
SSDEEP
1536:NDeRbhFLOm2cXe/n7xqj436XdIoLPoTTwf7duwNe186rdmnsa6gDZtJSK6c:NDwDim2n/GXD0wfBXe11wnsLgDZtU
Static task
static1
Behavioral task
behavioral1
Sample
3af6d6f0b294376ac7279228622ac9d6_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
3af6d6f0b294376ac7279228622ac9d6_JaffaCakes118
-
Size
100KB
-
MD5
3af6d6f0b294376ac7279228622ac9d6
-
SHA1
1ef27dbbad052308f96be823e807ae3b32d1b435
-
SHA256
e4c8e18cae066812ca0d6eada8ee73077832a68cf5dde7ebd603308531e60be9
-
SHA512
e97af6991b238fc5a6d4dbc0258b1bb6659592f5f13559edfd498b37c72a88e522d3cdb074318e527b61e7b31421c583378532abc3a6d84d02c277369460b177
-
SSDEEP
1536:NDeRbhFLOm2cXe/n7xqj436XdIoLPoTTwf7duwNe186rdmnsa6gDZtJSK6c:NDwDim2n/GXD0wfBXe11wnsLgDZtU
-
Modifies firewall policy service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5