General
-
Target
d379ee9c019061413ff1d0957bf08490_JaffaCakes118
-
Size
100KB
-
Sample
241207-y86cdasjh1
-
MD5
d379ee9c019061413ff1d0957bf08490
-
SHA1
3ceb76d3a86fbc7c86201610110b153dd6e82190
-
SHA256
fcb2e6dc0b49a961a156100c248681eda862bb8373e4e31430e6360c48c58b5e
-
SHA512
6709c973c936a4486ef53eb2a5e9be4bda801d089d0e11402c8d8b899c5847871e468f6b5d645447be03bc99b4a4865f5e827b4d41a057ee672d9cd692855074
-
SSDEEP
1536:amQJxw71SjWJjDItDrfIVUIXBZdYfZFWc6e4mN0plo180dNyu4lKHmKCcg0kP4/:gJxSIBBIRgRchmerIhyu4lgHgT4
Static task
static1
Behavioral task
behavioral1
Sample
d379ee9c019061413ff1d0957bf08490_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
d379ee9c019061413ff1d0957bf08490_JaffaCakes118
-
Size
100KB
-
MD5
d379ee9c019061413ff1d0957bf08490
-
SHA1
3ceb76d3a86fbc7c86201610110b153dd6e82190
-
SHA256
fcb2e6dc0b49a961a156100c248681eda862bb8373e4e31430e6360c48c58b5e
-
SHA512
6709c973c936a4486ef53eb2a5e9be4bda801d089d0e11402c8d8b899c5847871e468f6b5d645447be03bc99b4a4865f5e827b4d41a057ee672d9cd692855074
-
SSDEEP
1536:amQJxw71SjWJjDItDrfIVUIXBZdYfZFWc6e4mN0plo180dNyu4lKHmKCcg0kP4/:gJxSIBBIRgRchmerIhyu4lgHgT4
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5