General
-
Target
3e4b983e96f36c9df616648be3ecc1a5_JaffaCakes118
-
Size
100KB
-
Sample
241013-g6q18stakg
-
MD5
3e4b983e96f36c9df616648be3ecc1a5
-
SHA1
f1cca76d841b421b9b38401c7c1165323b6b003e
-
SHA256
cff3ac04c77cce67e271092447a0985bdcea8e88f32370c99bd6e3133044bb3a
-
SHA512
1cf4a93b3f4073775bda1aebea2058e2c408bf9f07fd26f50e8e204b2b664fb63f26ee59e1fb0d5e772c76774c7552cf22862c91dcdf1b58cfc8346cbc256625
-
SSDEEP
1536:2FotvPH0vlEAMgZ7fx1xkvlVlVQQhiOAglwivvHBvUeIMzRX:Yotvv0ZVtfSvcOPAgL5PNX
Static task
static1
Behavioral task
behavioral1
Sample
3e4b983e96f36c9df616648be3ecc1a5_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
3e4b983e96f36c9df616648be3ecc1a5_JaffaCakes118
-
Size
100KB
-
MD5
3e4b983e96f36c9df616648be3ecc1a5
-
SHA1
f1cca76d841b421b9b38401c7c1165323b6b003e
-
SHA256
cff3ac04c77cce67e271092447a0985bdcea8e88f32370c99bd6e3133044bb3a
-
SHA512
1cf4a93b3f4073775bda1aebea2058e2c408bf9f07fd26f50e8e204b2b664fb63f26ee59e1fb0d5e772c76774c7552cf22862c91dcdf1b58cfc8346cbc256625
-
SSDEEP
1536:2FotvPH0vlEAMgZ7fx1xkvlVlVQQhiOAglwivvHBvUeIMzRX:Yotvv0ZVtfSvcOPAgL5PNX
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5