General
-
Target
d1e8bb3aeea615b55a273c56de13a657_JaffaCakes118
-
Size
120KB
-
Sample
241207-l8cc3sxqbx
-
MD5
d1e8bb3aeea615b55a273c56de13a657
-
SHA1
f0ca8b3e24ab0e523271bd398ebf842bfde05e3b
-
SHA256
e7544e995e7c96878ec0941e240f33a1be94dcde6905ad5d7af9a777c9dd3a84
-
SHA512
37f4345e944476f224dacde973f046bbf75afde6e9924cafa4a82bda9ce68198c1fe4e2e9cbf2bb01e497d246d5521cd17acae996f6102cce2ab792896630587
-
SSDEEP
3072:xWNvFAjFZ+caA5WeEdwkFKjXD4W/bg6lWlBOWCQAOxox:xcvFAjb+caA5We94mcSMXCJNx
Static task
static1
Behavioral task
behavioral1
Sample
d1e8bb3aeea615b55a273c56de13a657_JaffaCakes118.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d1e8bb3aeea615b55a273c56de13a657_JaffaCakes118
-
Size
120KB
-
MD5
d1e8bb3aeea615b55a273c56de13a657
-
SHA1
f0ca8b3e24ab0e523271bd398ebf842bfde05e3b
-
SHA256
e7544e995e7c96878ec0941e240f33a1be94dcde6905ad5d7af9a777c9dd3a84
-
SHA512
37f4345e944476f224dacde973f046bbf75afde6e9924cafa4a82bda9ce68198c1fe4e2e9cbf2bb01e497d246d5521cd17acae996f6102cce2ab792896630587
-
SSDEEP
3072:xWNvFAjFZ+caA5WeEdwkFKjXD4W/bg6lWlBOWCQAOxox:xcvFAjb+caA5We94mcSMXCJNx
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5