General
-
Target
d49cdebf2f20766c111bd01f83c23947_JaffaCakes118
-
Size
92KB
-
Sample
241208-bzm34szrgq
-
MD5
d49cdebf2f20766c111bd01f83c23947
-
SHA1
c9ea2ceb91863699df522b85bb4aa8a53ce4b4d8
-
SHA256
e73b542b348f9ba35b199c5fcdd0abb871355ed14dad46482061addb87dd1918
-
SHA512
953b00deea295b8f21a83286a5dbb54eb4bb2d1761c222fa223a98e99ceab7cae83c7091bed1aa9da71d28aae264847108ce617bc18aa2152ddf823a152bb90b
-
SSDEEP
1536:D2rXYhLQq+PnX3FGzaXTU2N+J1ARisEmZuDNZ1BqRb:oxnnFGz+H+J1g5ZgBqRb
Behavioral task
behavioral1
Sample
d49cdebf2f20766c111bd01f83c23947_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d49cdebf2f20766c111bd01f83c23947_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d49cdebf2f20766c111bd01f83c23947_JaffaCakes118
-
Size
92KB
-
MD5
d49cdebf2f20766c111bd01f83c23947
-
SHA1
c9ea2ceb91863699df522b85bb4aa8a53ce4b4d8
-
SHA256
e73b542b348f9ba35b199c5fcdd0abb871355ed14dad46482061addb87dd1918
-
SHA512
953b00deea295b8f21a83286a5dbb54eb4bb2d1761c222fa223a98e99ceab7cae83c7091bed1aa9da71d28aae264847108ce617bc18aa2152ddf823a152bb90b
-
SSDEEP
1536:D2rXYhLQq+PnX3FGzaXTU2N+J1ARisEmZuDNZ1BqRb:oxnnFGz+H+J1g5ZgBqRb
-
Sality family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Indicator Removal
1File Deletion
1Modify Registry
4