General
-
Target
d7e5db472b1ab11b1e933bed02b7a97e_JaffaCakes118
-
Size
100KB
-
Sample
241208-tletpaylav
-
MD5
d7e5db472b1ab11b1e933bed02b7a97e
-
SHA1
612579b542b51be7ae155e137f106a1f49dc27db
-
SHA256
fabe982ce790e343b54bad0df0008b6c7575059a17374386f092a60643d251e7
-
SHA512
2f52e10b2c87c36960984921578f7c25425a65c6eff965e70c5f85318ae465e467e1c92adf65524d59e190af8d61c7a37191097dccb6dbe01b5a705cc8a63dac
-
SSDEEP
3072:afosPd48ZhZLtybmKqkgEOOJqlxg6RTsQQPLGc:axd4ahuUkghxpRYQQPR
Static task
static1
Behavioral task
behavioral1
Sample
d7e5db472b1ab11b1e933bed02b7a97e_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
d7e5db472b1ab11b1e933bed02b7a97e_JaffaCakes118
-
Size
100KB
-
MD5
d7e5db472b1ab11b1e933bed02b7a97e
-
SHA1
612579b542b51be7ae155e137f106a1f49dc27db
-
SHA256
fabe982ce790e343b54bad0df0008b6c7575059a17374386f092a60643d251e7
-
SHA512
2f52e10b2c87c36960984921578f7c25425a65c6eff965e70c5f85318ae465e467e1c92adf65524d59e190af8d61c7a37191097dccb6dbe01b5a705cc8a63dac
-
SSDEEP
3072:afosPd48ZhZLtybmKqkgEOOJqlxg6RTsQQPLGc:axd4ahuUkghxpRYQQPR
-
Modifies firewall policy service
-
Sality family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5