General
-
Target
1c0d65090dfb87e07e9c1f3b6a5204b7_JaffaCakes118
-
Size
100KB
-
Sample
240701-w4svdawgln
-
MD5
1c0d65090dfb87e07e9c1f3b6a5204b7
-
SHA1
560047cf70181bb88c97a2c0662f14f487f64a35
-
SHA256
bdc2ef054366bae0a40e40b1a08d1e44856960baedf4c9887410e560c4a0698d
-
SHA512
5421a21216008eaa86614ae241a6eef312a02bd9718491ba169f0c1a9064c243360a4d30d7528000cbd15dcc19a7eca9b2a73f2e4dd974411d66c98873d810bb
-
SSDEEP
1536:mavQKDzYm4mXj5dsSSUjjKtQ175fKKuX5L5XdvLqkVYzEgDq8SnDYhZ1:DfrbsLZtQzLULvRYzEgDqbnMhL
Static task
static1
Behavioral task
behavioral1
Sample
1c0d65090dfb87e07e9c1f3b6a5204b7_JaffaCakes118.exe
Resource
win7-20240611-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
1c0d65090dfb87e07e9c1f3b6a5204b7_JaffaCakes118
-
Size
100KB
-
MD5
1c0d65090dfb87e07e9c1f3b6a5204b7
-
SHA1
560047cf70181bb88c97a2c0662f14f487f64a35
-
SHA256
bdc2ef054366bae0a40e40b1a08d1e44856960baedf4c9887410e560c4a0698d
-
SHA512
5421a21216008eaa86614ae241a6eef312a02bd9718491ba169f0c1a9064c243360a4d30d7528000cbd15dcc19a7eca9b2a73f2e4dd974411d66c98873d810bb
-
SSDEEP
1536:mavQKDzYm4mXj5dsSSUjjKtQ175fKKuX5L5XdvLqkVYzEgDq8SnDYhZ1:DfrbsLZtQzLULvRYzEgDqbnMhL
-
Modifies firewall policy service
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1