General
-
Target
d50ef1a1e1f1641f448f73a4dda4c046_JaffaCakes118
-
Size
100KB
-
Sample
241208-d6hhbazrhv
-
MD5
d50ef1a1e1f1641f448f73a4dda4c046
-
SHA1
948b06088383db42b6b22f5784a8e6653ab1cc77
-
SHA256
b7bca355c9a1cd9444ba0756287abbc30324c36e762a05d3e91ed75770d1c13e
-
SHA512
700165c0ec763b3856bc96b6fe0fdb26646869e2bc8b48f67eb409153561cd1a4b37d9b1d2d96d8b06917dfb556aaff7fb88bba20baf485bb66e680c7c76b8c4
-
SSDEEP
3072:s1uPoEAlHEl2yWLvmXYjCvtktv12Sk4v:subavm5ktv12SkO
Static task
static1
Behavioral task
behavioral1
Sample
d50ef1a1e1f1641f448f73a4dda4c046_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
d50ef1a1e1f1641f448f73a4dda4c046_JaffaCakes118
-
Size
100KB
-
MD5
d50ef1a1e1f1641f448f73a4dda4c046
-
SHA1
948b06088383db42b6b22f5784a8e6653ab1cc77
-
SHA256
b7bca355c9a1cd9444ba0756287abbc30324c36e762a05d3e91ed75770d1c13e
-
SHA512
700165c0ec763b3856bc96b6fe0fdb26646869e2bc8b48f67eb409153561cd1a4b37d9b1d2d96d8b06917dfb556aaff7fb88bba20baf485bb66e680c7c76b8c4
-
SSDEEP
3072:s1uPoEAlHEl2yWLvmXYjCvtktv12Sk4v:subavm5ktv12SkO
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5