General
-
Target
53bb330ed9439140aec1ca9c2ca8a04f_JaffaCakes118
-
Size
100KB
-
Sample
241017-zxqyzszbjm
-
MD5
53bb330ed9439140aec1ca9c2ca8a04f
-
SHA1
680d50fe034269d60bed3f0ba7a4a5de620f4f78
-
SHA256
dce20797f973b91fb19d00dc72f7f2991981243df4cea30fa6fa3b58935760a1
-
SHA512
6ed3bcf7a80a637bdb2d69c1f72f8e8f17431e568640fc97d9f31ff87000e9d0f108ab4ce0d59e5bf404da66c0401cb69489e6160282146bf491a55e6cc9b785
-
SSDEEP
1536:kdEihSq1kDEVoJucY8r82euV59/oUgV8AZJHritac0I6l/HeyqH9gYNLpl:Xct1kDAeY8rNx/of6AZxioygHpqH9DR
Static task
static1
Behavioral task
behavioral1
Sample
53bb330ed9439140aec1ca9c2ca8a04f_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
53bb330ed9439140aec1ca9c2ca8a04f_JaffaCakes118
-
Size
100KB
-
MD5
53bb330ed9439140aec1ca9c2ca8a04f
-
SHA1
680d50fe034269d60bed3f0ba7a4a5de620f4f78
-
SHA256
dce20797f973b91fb19d00dc72f7f2991981243df4cea30fa6fa3b58935760a1
-
SHA512
6ed3bcf7a80a637bdb2d69c1f72f8e8f17431e568640fc97d9f31ff87000e9d0f108ab4ce0d59e5bf404da66c0401cb69489e6160282146bf491a55e6cc9b785
-
SSDEEP
1536:kdEihSq1kDEVoJucY8r82euV59/oUgV8AZJHritac0I6l/HeyqH9gYNLpl:Xct1kDAeY8rNx/of6AZxioygHpqH9DR
-
Modifies firewall policy service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5