General
-
Target
d262e31f7064b37c64074f3efdf5d4e7_JaffaCakes118
-
Size
120KB
-
Sample
241207-pdjepaxlek
-
MD5
d262e31f7064b37c64074f3efdf5d4e7
-
SHA1
481888d41074773eb6895f6e29f0b330a6c68299
-
SHA256
66cf90b846d0281d98709495a6bf53b67ab2d34f7fbbe39a9109e8cbbd73b16c
-
SHA512
bdb05dff21cdc7cdb06ac36c68b80fb2dc81c5508dfd56051e087b526f5ba11d5c5072ac30f8bbd483ec879602af4720efb41b2f7b1445026311d0f391c9d483
-
SSDEEP
3072:wNRl36AZXorwnVNnHvXmdZIP7CB7dJ8hq:ARlDPOLIGBdJ
Static task
static1
Behavioral task
behavioral1
Sample
d262e31f7064b37c64074f3efdf5d4e7_JaffaCakes118.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d262e31f7064b37c64074f3efdf5d4e7_JaffaCakes118
-
Size
120KB
-
MD5
d262e31f7064b37c64074f3efdf5d4e7
-
SHA1
481888d41074773eb6895f6e29f0b330a6c68299
-
SHA256
66cf90b846d0281d98709495a6bf53b67ab2d34f7fbbe39a9109e8cbbd73b16c
-
SHA512
bdb05dff21cdc7cdb06ac36c68b80fb2dc81c5508dfd56051e087b526f5ba11d5c5072ac30f8bbd483ec879602af4720efb41b2f7b1445026311d0f391c9d483
-
SSDEEP
3072:wNRl36AZXorwnVNnHvXmdZIP7CB7dJ8hq:ARlDPOLIGBdJ
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5