General
-
Target
d616b14a95e0617ecbb53c06ef33bc43_JaffaCakes118
-
Size
100KB
-
Sample
241208-j5j8eayjby
-
MD5
d616b14a95e0617ecbb53c06ef33bc43
-
SHA1
7f505dcf2a4f6b605d926e4239e5cfda004546e2
-
SHA256
44619e6c0e989f2b00752714dfb3bf4a3868fc81657690772c68615225af8c85
-
SHA512
c237449ada62e1b255aab00cb5f0dc194b3f2de6ea3409421927eb1ff7e0162c858f5deed81258b0b8c5f8ee2c9c3b2334eb59ee77a33b35867e5e7ea1095815
-
SSDEEP
3072:hCS8lG3C2v0rb0XbkbtaW9v5Kqve3TwMl+4:hCS8YC2v60XbkIW9vRmTww+4
Static task
static1
Behavioral task
behavioral1
Sample
d616b14a95e0617ecbb53c06ef33bc43_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
d616b14a95e0617ecbb53c06ef33bc43_JaffaCakes118
-
Size
100KB
-
MD5
d616b14a95e0617ecbb53c06ef33bc43
-
SHA1
7f505dcf2a4f6b605d926e4239e5cfda004546e2
-
SHA256
44619e6c0e989f2b00752714dfb3bf4a3868fc81657690772c68615225af8c85
-
SHA512
c237449ada62e1b255aab00cb5f0dc194b3f2de6ea3409421927eb1ff7e0162c858f5deed81258b0b8c5f8ee2c9c3b2334eb59ee77a33b35867e5e7ea1095815
-
SSDEEP
3072:hCS8lG3C2v0rb0XbkbtaW9v5Kqve3TwMl+4:hCS8YC2v60XbkIW9vRmTww+4
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5