General
-
Target
d1ff8352eb29212fd7b3cde9e6872368_JaffaCakes118
-
Size
1.3MB
-
Sample
241207-mk6sfstrbl
-
MD5
d1ff8352eb29212fd7b3cde9e6872368
-
SHA1
14a9d7bde2c549a72fd448d7394c2688501a7443
-
SHA256
de3ffd1d1c48455b558c91a48b5fc2c20e0715ac402865eb3fe234f141dd6d82
-
SHA512
92295911c9df790bd3378ebd3549aaf3e1f2a858226ceebc9625a1bdb5381fb18c769b3a2b4a198068adc833a9f591d6b83fd9b7d75aa61960b34c3a0686a5cf
-
SSDEEP
24576:yWmgKT7JKlrQdLxmkPYPdAlPzRdtaJ19dLWVFRh1BdrCPknyLBDMu+:yWmxpKSgkg1AFFdta5dcFRh1BZckkBP+
Static task
static1
Behavioral task
behavioral1
Sample
d1ff8352eb29212fd7b3cde9e6872368_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1ff8352eb29212fd7b3cde9e6872368_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d1ff8352eb29212fd7b3cde9e6872368_JaffaCakes118
-
Size
1.3MB
-
MD5
d1ff8352eb29212fd7b3cde9e6872368
-
SHA1
14a9d7bde2c549a72fd448d7394c2688501a7443
-
SHA256
de3ffd1d1c48455b558c91a48b5fc2c20e0715ac402865eb3fe234f141dd6d82
-
SHA512
92295911c9df790bd3378ebd3549aaf3e1f2a858226ceebc9625a1bdb5381fb18c769b3a2b4a198068adc833a9f591d6b83fd9b7d75aa61960b34c3a0686a5cf
-
SSDEEP
24576:yWmgKT7JKlrQdLxmkPYPdAlPzRdtaJ19dLWVFRh1BdrCPknyLBDMu+:yWmxpKSgkg1AFFdta5dcFRh1BZckkBP+
-
Sality family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Pre-OS Boot
1Bootkit
1