General
-
Target
887d7806f8d8e9aae5208d4f88615668_JaffaCakes118
-
Size
1.6MB
-
Sample
241102-3sr72aykcy
-
MD5
887d7806f8d8e9aae5208d4f88615668
-
SHA1
2f2d483c054d2afffcc1cddb5006f1f044167410
-
SHA256
7be182a292f3f486a50ebba12d0e93bf10c5eb91c1eada75bc491b4656324092
-
SHA512
fddc584017fdd1e22b38d0b3715693f71ce663d7cb9f3317644a102ebc9758f39161045a9757f4b440299e6ce42a2069c79d249270fc5a3270dc4fb8a97827ba
-
SSDEEP
12288:W6tkNbROsQssjY7VzThSv0jSwB5489eDvauRBk66e:HkNVLaEhSGaFaWG
Static task
static1
Behavioral task
behavioral1
Sample
887d7806f8d8e9aae5208d4f88615668_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Targets
-
-
Target
887d7806f8d8e9aae5208d4f88615668_JaffaCakes118
-
Size
1.6MB
-
MD5
887d7806f8d8e9aae5208d4f88615668
-
SHA1
2f2d483c054d2afffcc1cddb5006f1f044167410
-
SHA256
7be182a292f3f486a50ebba12d0e93bf10c5eb91c1eada75bc491b4656324092
-
SHA512
fddc584017fdd1e22b38d0b3715693f71ce663d7cb9f3317644a102ebc9758f39161045a9757f4b440299e6ce42a2069c79d249270fc5a3270dc4fb8a97827ba
-
SSDEEP
12288:W6tkNbROsQssjY7VzThSv0jSwB5489eDvauRBk66e:HkNVLaEhSGaFaWG
-
Darkcomet family
-
Modifies firewall policy service
-
Sality family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6