General
-
Target
d60139db2a6d23c965fbc6f844d58d44_JaffaCakes118
-
Size
71KB
-
Sample
241208-jq18dasmhk
-
MD5
d60139db2a6d23c965fbc6f844d58d44
-
SHA1
af5ddffc0f6f3433332ceac8ada9ab7906e65729
-
SHA256
ab50c7a6412399a127f6df559d85bdb7de4e5969611d83b4110d766953082ff0
-
SHA512
89f16264493c78659b25b74d3e93b421985ca809f62eeedb1d6c25f997212341997ea2edbf886667a9b263b189252aa11c5f40daab472e7ebda850feb0b255b0
-
SSDEEP
1536:hRBqjWBXxJzH18U1q+xAe90GoAlQuCHOagmuI/Fw:hTq6BjzH18NDW0GoAlQbHOjmuui
Static task
static1
Behavioral task
behavioral1
Sample
d60139db2a6d23c965fbc6f844d58d44_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d60139db2a6d23c965fbc6f844d58d44_JaffaCakes118
-
Size
71KB
-
MD5
d60139db2a6d23c965fbc6f844d58d44
-
SHA1
af5ddffc0f6f3433332ceac8ada9ab7906e65729
-
SHA256
ab50c7a6412399a127f6df559d85bdb7de4e5969611d83b4110d766953082ff0
-
SHA512
89f16264493c78659b25b74d3e93b421985ca809f62eeedb1d6c25f997212341997ea2edbf886667a9b263b189252aa11c5f40daab472e7ebda850feb0b255b0
-
SSDEEP
1536:hRBqjWBXxJzH18U1q+xAe90GoAlQuCHOagmuI/Fw:hTq6BjzH18NDW0GoAlQbHOjmuui
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5