General
-
Target
5691f8daf89fcb97032f8ab5b4d671db_JaffaCakes118
-
Size
1.1MB
-
Sample
241018-k116ssybng
-
MD5
5691f8daf89fcb97032f8ab5b4d671db
-
SHA1
8a7f6d40e5c44cc48e847806683cb419ed345f11
-
SHA256
776d07a69fd0780e421400e5eb3d6469195d161eb063f712add08f25c6077fed
-
SHA512
dd1d6f00c2e81af8daf8402390847028096b6746667b839bf8ee4ee13fde901f6bcebcb964deb041b59289befc1501cf6d6f59cebf70a8ab95d692dc58dd391e
-
SSDEEP
24576:M29edV3EqRFllOCq4Bj5g13isqB4wWbouQ:D9a3FrlHq4vjsqB4wgK
Behavioral task
behavioral1
Sample
5691f8daf89fcb97032f8ab5b4d671db_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Extracted
darkcomet
Guest 777
magnumbiz2.no-ip.biz:1000
DC_MUTEX-WUY2B69
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
lbwAN2cQj9ve
-
install
true
-
offline_keylogger
true
-
password
123456
-
persistence
false
-
reg_key
MicroUpdate
Targets
-
-
Target
5691f8daf89fcb97032f8ab5b4d671db_JaffaCakes118
-
Size
1.1MB
-
MD5
5691f8daf89fcb97032f8ab5b4d671db
-
SHA1
8a7f6d40e5c44cc48e847806683cb419ed345f11
-
SHA256
776d07a69fd0780e421400e5eb3d6469195d161eb063f712add08f25c6077fed
-
SHA512
dd1d6f00c2e81af8daf8402390847028096b6746667b839bf8ee4ee13fde901f6bcebcb964deb041b59289befc1501cf6d6f59cebf70a8ab95d692dc58dd391e
-
SSDEEP
24576:M29edV3EqRFllOCq4Bj5g13isqB4wWbouQ:D9a3FrlHq4vjsqB4wgK
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7