General
-
Target
d10907538e1951fa2951833e04f0d532_JaffaCakes118
-
Size
100KB
-
Sample
241207-g2tlkawkan
-
MD5
d10907538e1951fa2951833e04f0d532
-
SHA1
7f90308a15ad90d7481fde4c53a4918a1e955383
-
SHA256
ef4a2ebe23d9c468ae6fff4e931ca0bd357fcd4d261dc254a55a17c9e2cb5a40
-
SHA512
66adbf2963ed441347def48aeb49b3c4e22eaba3b09519497c3c4700c4c0c20ceb07c7a31e0632e20047b19c5d9df7073dcdf4e314c8c742fa062d9ae26d460e
-
SSDEEP
1536:Le5vNW0mJRPLDavzDbhaaN+/CANP2H1zYu2IinxMCkDVqQ3XTf6Wu30:LelaRP+dRN+1Wh2Iikpx3DO
Static task
static1
Behavioral task
behavioral1
Sample
d10907538e1951fa2951833e04f0d532_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
d10907538e1951fa2951833e04f0d532_JaffaCakes118
-
Size
100KB
-
MD5
d10907538e1951fa2951833e04f0d532
-
SHA1
7f90308a15ad90d7481fde4c53a4918a1e955383
-
SHA256
ef4a2ebe23d9c468ae6fff4e931ca0bd357fcd4d261dc254a55a17c9e2cb5a40
-
SHA512
66adbf2963ed441347def48aeb49b3c4e22eaba3b09519497c3c4700c4c0c20ceb07c7a31e0632e20047b19c5d9df7073dcdf4e314c8c742fa062d9ae26d460e
-
SSDEEP
1536:Le5vNW0mJRPLDavzDbhaaN+/CANP2H1zYu2IinxMCkDVqQ3XTf6Wu30:LelaRP+dRN+1Wh2Iikpx3DO
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5