General
-
Target
JaffaCakes118_76d0072592594af0e5d3a20116c6da30
-
Size
343KB
-
Sample
250104-bv5glawnal
-
MD5
76d0072592594af0e5d3a20116c6da30
-
SHA1
c003b8328ea4a6a64117eed7c07a6ca30f90b90c
-
SHA256
162350a78ef1b3dfa4344f300aaac8d57fb5f24567b389e37ded5b46d85b19b1
-
SHA512
8e202aaf46ab2ca0398b6e617c0fcc8424c3084654bca948d1df381039b6aa3cf97a20e67837aa695d880a343faee717a5bce9c3973c69690a571f4767ba0813
-
SSDEEP
6144:2qHGoq/TMMFIgLYW6E5vmCTjGAwQfYvP9RpVVLLuyl1yMcPmRH:24dNMFIkP5vBjTx6pVVuylTcPmRH
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_76d0072592594af0e5d3a20116c6da30.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_76d0072592594af0e5d3a20116c6da30
-
Size
343KB
-
MD5
76d0072592594af0e5d3a20116c6da30
-
SHA1
c003b8328ea4a6a64117eed7c07a6ca30f90b90c
-
SHA256
162350a78ef1b3dfa4344f300aaac8d57fb5f24567b389e37ded5b46d85b19b1
-
SHA512
8e202aaf46ab2ca0398b6e617c0fcc8424c3084654bca948d1df381039b6aa3cf97a20e67837aa695d880a343faee717a5bce9c3973c69690a571f4767ba0813
-
SSDEEP
6144:2qHGoq/TMMFIgLYW6E5vmCTjGAwQfYvP9RpVVLLuyl1yMcPmRH:24dNMFIkP5vBjTx6pVVuylTcPmRH
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Ramnit family
-
Sality family
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7