General
-
Target
d36ed88abe380278cd12c2ccc2a6f25f_JaffaCakes118
-
Size
192KB
-
Sample
241207-y222dawrhr
-
MD5
d36ed88abe380278cd12c2ccc2a6f25f
-
SHA1
49065e3f54be96b4ce4a25dcada33c22300b16ef
-
SHA256
39af6234948f20547216f1809c248e6830310bbf0f7191b4e6993d23d3d316a1
-
SHA512
91a1192af2b41497aaf4b16f801ff30e5faacc71f96ba65085755f6749f70239d422013d7493447b9f7d2e6e6a14d9c019c06d66cbbb1f480ca0bf5d09557374
-
SSDEEP
3072:oacmXJfdXVC7vs2nc4jiktNasb0hl2rAag4IPfp:obedld2c4jCA0f0Mfp
Static task
static1
Behavioral task
behavioral1
Sample
d36ed88abe380278cd12c2ccc2a6f25f_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
d36ed88abe380278cd12c2ccc2a6f25f_JaffaCakes118
-
Size
192KB
-
MD5
d36ed88abe380278cd12c2ccc2a6f25f
-
SHA1
49065e3f54be96b4ce4a25dcada33c22300b16ef
-
SHA256
39af6234948f20547216f1809c248e6830310bbf0f7191b4e6993d23d3d316a1
-
SHA512
91a1192af2b41497aaf4b16f801ff30e5faacc71f96ba65085755f6749f70239d422013d7493447b9f7d2e6e6a14d9c019c06d66cbbb1f480ca0bf5d09557374
-
SSDEEP
3072:oacmXJfdXVC7vs2nc4jiktNasb0hl2rAag4IPfp:obedld2c4jCA0f0Mfp
-
Modifies firewall policy service
-
Sality family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6