General
-
Target
JaffaCakes118_8d906b9ed7ab800c234db4f13fb173ec
-
Size
479KB
-
Sample
250203-29p9bsymak
-
MD5
8d906b9ed7ab800c234db4f13fb173ec
-
SHA1
23114352fa03b7765c7528dea58d39a580c0b5e2
-
SHA256
5c2b4e2807ae47b64c730470b31b356e9ec7d5076cf2a273582ef65d05659221
-
SHA512
4852ac66adecf6e66841b95556508bf2ec544ff78bd68ddc9f8d01cf10e39060cb455aeeb493d7955ec81c9134271f22b43ee50f880959c2acaeccdf7c7a3f34
-
SSDEEP
12288:wYU38tWvCBk0+d4Ouz90NWkja7ZRawg1qj136pS8rtft6FJDMI:vgd4OLkk+f+qF6o8hft6Fd
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8d906b9ed7ab800c234db4f13fb173ec.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8d906b9ed7ab800c234db4f13fb173ec.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_8d906b9ed7ab800c234db4f13fb173ec
-
Size
479KB
-
MD5
8d906b9ed7ab800c234db4f13fb173ec
-
SHA1
23114352fa03b7765c7528dea58d39a580c0b5e2
-
SHA256
5c2b4e2807ae47b64c730470b31b356e9ec7d5076cf2a273582ef65d05659221
-
SHA512
4852ac66adecf6e66841b95556508bf2ec544ff78bd68ddc9f8d01cf10e39060cb455aeeb493d7955ec81c9134271f22b43ee50f880959c2acaeccdf7c7a3f34
-
SSDEEP
12288:wYU38tWvCBk0+d4Ouz90NWkja7ZRawg1qj136pS8rtft6FJDMI:vgd4OLkk+f+qF6o8hft6Fd
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7