General
-
Target
JaffaCakes118_63db203857d3274284373b7b274eeaf0
-
Size
172KB
-
Sample
250102-khvlastmfx
-
MD5
63db203857d3274284373b7b274eeaf0
-
SHA1
415a36621eb0f772a385b2698a1183df8d88342d
-
SHA256
1b0719fb85fe2ea6f9bdc5a8debdcc998209162ab3fb66ff73daaa3f3a839689
-
SHA512
344cf3c4fd5a72e51eec639f987ba07e557fd37e1aedea097b60ef821d132229b057e82c88c84e9567a1d609456109f97f6f58ace951fce237bc1ef2301e39ff
-
SSDEEP
3072:3xf026qbJ1y4GNq5jz+/YiMavc+UuOBbkfRODUHd1SFKlaMGJ:8qHGoq/TMXwgbaTdx8bJ
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_63db203857d3274284373b7b274eeaf0.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_63db203857d3274284373b7b274eeaf0
-
Size
172KB
-
MD5
63db203857d3274284373b7b274eeaf0
-
SHA1
415a36621eb0f772a385b2698a1183df8d88342d
-
SHA256
1b0719fb85fe2ea6f9bdc5a8debdcc998209162ab3fb66ff73daaa3f3a839689
-
SHA512
344cf3c4fd5a72e51eec639f987ba07e557fd37e1aedea097b60ef821d132229b057e82c88c84e9567a1d609456109f97f6f58ace951fce237bc1ef2301e39ff
-
SSDEEP
3072:3xf026qbJ1y4GNq5jz+/YiMavc+UuOBbkfRODUHd1SFKlaMGJ:8qHGoq/TMXwgbaTdx8bJ
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Ramnit family
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7