General
-
Target
dca03efa7e5b8e20cd3b7e54a68cf32f_JaffaCakes118
-
Size
144KB
-
Sample
241210-c3h41a1kct
-
MD5
dca03efa7e5b8e20cd3b7e54a68cf32f
-
SHA1
c0ca72e1934cabffadbad8437a94c480eec1f6b2
-
SHA256
09b107738c1f37acc181533d47298a47988928477d89b2412c1c0bfc1b8e2a76
-
SHA512
d845c12328276565077df6fe07356633d32eb6a513b45a700046c92c10119c580607e54b04e79ec938556f94eac22413c8d140023be0ed241f26169befa7befd
-
SSDEEP
3072:58NQKPWDymReaJltZrpRnvQy2t0EIxlFIjHGeRVHPm/Zu6B:aNSDymRvthpK1tCE7RVHPOZV
Static task
static1
Behavioral task
behavioral1
Sample
dca03efa7e5b8e20cd3b7e54a68cf32f_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
dca03efa7e5b8e20cd3b7e54a68cf32f_JaffaCakes118
-
Size
144KB
-
MD5
dca03efa7e5b8e20cd3b7e54a68cf32f
-
SHA1
c0ca72e1934cabffadbad8437a94c480eec1f6b2
-
SHA256
09b107738c1f37acc181533d47298a47988928477d89b2412c1c0bfc1b8e2a76
-
SHA512
d845c12328276565077df6fe07356633d32eb6a513b45a700046c92c10119c580607e54b04e79ec938556f94eac22413c8d140023be0ed241f26169befa7befd
-
SSDEEP
3072:58NQKPWDymReaJltZrpRnvQy2t0EIxlFIjHGeRVHPm/Zu6B:aNSDymRvthpK1tCE7RVHPOZV
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5