General
-
Target
d1d47d3424c8cdf825d16142abbef6cc_JaffaCakes118
-
Size
100KB
-
Sample
241207-lv15aaxkg1
-
MD5
d1d47d3424c8cdf825d16142abbef6cc
-
SHA1
97d00c03ac045913e6b2bc93bc91f2a146dbf1fb
-
SHA256
d8b7d3f5e3708504a4834279bade0905859179c13eef96d5b3578a0bb8b193e8
-
SHA512
17175b11a77f1d7c0894ccd4b4e572fe6600799f0b0257f6d7e25421c77eff15f510fcafcfc9434b925ef30698e259743c3f47686875da7d1062abed4fc90987
-
SSDEEP
3072:y5xs3Ct6QPFz85LQLhb26m7HOsfRPAtZ9aPjbxv:kxs3XQJ85EFbUHrRG2B
Static task
static1
Behavioral task
behavioral1
Sample
d1d47d3424c8cdf825d16142abbef6cc_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
d1d47d3424c8cdf825d16142abbef6cc_JaffaCakes118
-
Size
100KB
-
MD5
d1d47d3424c8cdf825d16142abbef6cc
-
SHA1
97d00c03ac045913e6b2bc93bc91f2a146dbf1fb
-
SHA256
d8b7d3f5e3708504a4834279bade0905859179c13eef96d5b3578a0bb8b193e8
-
SHA512
17175b11a77f1d7c0894ccd4b4e572fe6600799f0b0257f6d7e25421c77eff15f510fcafcfc9434b925ef30698e259743c3f47686875da7d1062abed4fc90987
-
SSDEEP
3072:y5xs3Ct6QPFz85LQLhb26m7HOsfRPAtZ9aPjbxv:kxs3XQJ85EFbUHrRG2B
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5