General
-
Target
d28274894da19ccbcad3a2ed93da481d_JaffaCakes118
-
Size
311KB
-
Sample
241207-pyfjjaxraq
-
MD5
d28274894da19ccbcad3a2ed93da481d
-
SHA1
911a426e6f31e139f14fca3ef39ee58777d00746
-
SHA256
a6bcf7096614b005b4a76df83fa07953cab1a342a245ccd58eab72bdc0f7b6dd
-
SHA512
5049fe6027bf1c86988439fcce9107abc00794018d1c53f26c5ed9e8e0da84755a5485de754e4f98f2470f9871cbfacf9533f3de10779a44f2ce848be494c511
-
SSDEEP
6144:sTfFDbRnOTWbaRGm4vUW+t82MmRu+F2+UVm3Ar8QsVgbomacS0:+5O6m4vo7DU9oQB6cB
Static task
static1
Behavioral task
behavioral1
Sample
d28274894da19ccbcad3a2ed93da481d_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
d28274894da19ccbcad3a2ed93da481d_JaffaCakes118
-
Size
311KB
-
MD5
d28274894da19ccbcad3a2ed93da481d
-
SHA1
911a426e6f31e139f14fca3ef39ee58777d00746
-
SHA256
a6bcf7096614b005b4a76df83fa07953cab1a342a245ccd58eab72bdc0f7b6dd
-
SHA512
5049fe6027bf1c86988439fcce9107abc00794018d1c53f26c5ed9e8e0da84755a5485de754e4f98f2470f9871cbfacf9533f3de10779a44f2ce848be494c511
-
SSDEEP
6144:sTfFDbRnOTWbaRGm4vUW+t82MmRu+F2+UVm3Ar8QsVgbomacS0:+5O6m4vo7DU9oQB6cB
-
Modifies firewall policy service
-
Sality family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5