General
-
Target
d85d3115a7a61b0850e6cdedc50b6a24_JaffaCakes118
-
Size
120KB
-
Sample
241208-xdcwxa1rdy
-
MD5
d85d3115a7a61b0850e6cdedc50b6a24
-
SHA1
7d59406664a041368357ac3f14c4dd2636d360ee
-
SHA256
ede96fd213bb006d382a274b8ab26b1a56dd4202e802fb599cbaefbdf381a1aa
-
SHA512
a991b090a85e3870827385288fa3345530ba427da7a0d84774344a9c70f122b6a8eb46f8c007cc36dbe20ea454b4f47cca40b80d857998082660299fd0b374ad
-
SSDEEP
1536:j4qvFPI9IrPKqNXbIPZbuMVo0GxBCv5p8VpTjVONz2jo53zQ4wG/r7CT:jhI9wPKQbIPZbuMg05psx8z+m3Fr2
Static task
static1
Behavioral task
behavioral1
Sample
d85d3115a7a61b0850e6cdedc50b6a24_JaffaCakes118.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d85d3115a7a61b0850e6cdedc50b6a24_JaffaCakes118
-
Size
120KB
-
MD5
d85d3115a7a61b0850e6cdedc50b6a24
-
SHA1
7d59406664a041368357ac3f14c4dd2636d360ee
-
SHA256
ede96fd213bb006d382a274b8ab26b1a56dd4202e802fb599cbaefbdf381a1aa
-
SHA512
a991b090a85e3870827385288fa3345530ba427da7a0d84774344a9c70f122b6a8eb46f8c007cc36dbe20ea454b4f47cca40b80d857998082660299fd0b374ad
-
SSDEEP
1536:j4qvFPI9IrPKqNXbIPZbuMVo0GxBCv5p8VpTjVONz2jo53zQ4wG/r7CT:jhI9wPKQbIPZbuMg05psx8z+m3Fr2
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5