General
-
Target
dde1778d160b2a2822bc89f141f55b92_JaffaCakes118
-
Size
232KB
-
Sample
241210-kea3gs1kcz
-
MD5
dde1778d160b2a2822bc89f141f55b92
-
SHA1
0517b846063dfbc8c1cc06da9b2818579b4d22ee
-
SHA256
c72f4b0ec5e830f823d8803584c61b2b66492586746ef72f545ab2f9bdc42b0a
-
SHA512
4776febb78402485429b30f09fbe76bc9f217267c4d6e2beb853fa0b95b9ee569d6bf5cbc9cc65acb5b5f9caa4e1dc4a76da2f63027fec11f96a475f81b1831b
-
SSDEEP
6144:knyKw55nK7CcbCHGLFhdlAXk3stFSuH0+SlQh:w6R0EIhdlV3stFDYCh
Static task
static1
Behavioral task
behavioral1
Sample
dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
dde1778d160b2a2822bc89f141f55b92_JaffaCakes118
-
Size
232KB
-
MD5
dde1778d160b2a2822bc89f141f55b92
-
SHA1
0517b846063dfbc8c1cc06da9b2818579b4d22ee
-
SHA256
c72f4b0ec5e830f823d8803584c61b2b66492586746ef72f545ab2f9bdc42b0a
-
SHA512
4776febb78402485429b30f09fbe76bc9f217267c4d6e2beb853fa0b95b9ee569d6bf5cbc9cc65acb5b5f9caa4e1dc4a76da2f63027fec11f96a475f81b1831b
-
SSDEEP
6144:knyKw55nK7CcbCHGLFhdlAXk3stFSuH0+SlQh:w6R0EIhdlV3stFDYCh
-
Modifies visibility of file extensions in Explorer
-
Sality family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
3