General
-
Target
1c34f18b1b4fcc0509c31d515d870d42_JaffaCakes118
-
Size
100KB
-
Sample
240701-x2x7rayejl
-
MD5
1c34f18b1b4fcc0509c31d515d870d42
-
SHA1
2e1436b2cac6c4c26a7bcfde9117650d3ea857fb
-
SHA256
a42fd7003ddf80eeec110052ec5fade41c8d5eb55644c4136da29a4e70b22c75
-
SHA512
2f638e063b346bdb9deedf571b214a5b3c2aa221979c5d0e9872510f4ec2f25d1147723993c49be1ab9cb14d4fdea8fdfc1fd6d17573c6b411c1d5c01a89ff7b
-
SSDEEP
3072:JIAKGmg7Fg7hP4Fxq/vjC+R3RxE0mcbhZd2Jv:JkicvrDYcbTd2
Static task
static1
Behavioral task
behavioral1
Sample
1c34f18b1b4fcc0509c31d515d870d42_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
1c34f18b1b4fcc0509c31d515d870d42_JaffaCakes118
-
Size
100KB
-
MD5
1c34f18b1b4fcc0509c31d515d870d42
-
SHA1
2e1436b2cac6c4c26a7bcfde9117650d3ea857fb
-
SHA256
a42fd7003ddf80eeec110052ec5fade41c8d5eb55644c4136da29a4e70b22c75
-
SHA512
2f638e063b346bdb9deedf571b214a5b3c2aa221979c5d0e9872510f4ec2f25d1147723993c49be1ab9cb14d4fdea8fdfc1fd6d17573c6b411c1d5c01a89ff7b
-
SSDEEP
3072:JIAKGmg7Fg7hP4Fxq/vjC+R3RxE0mcbhZd2Jv:JkicvrDYcbTd2
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1