General
-
Target
de24bf3e96b1d23c8d1dc974adca4d36_JaffaCakes118
-
Size
123KB
-
Sample
241210-xaqzcstlcv
-
MD5
de24bf3e96b1d23c8d1dc974adca4d36
-
SHA1
c09a59bc8826f5f85d321726d41454a123f82864
-
SHA256
d0d933b572d7b3f782bd568a805965a896875e07319ab3bed0556e8d180c4efb
-
SHA512
57545b1d7839d1aadae29869b068bf0b3d99f8e28d29f4308934bb48058ab28048f18330e0df58327d2a10b7c3c15b7aa781f2db824a5ec993dfc31842fb0c9a
-
SSDEEP
3072:mt6pnukgsL3LA8MK48nGUFw8OoBTM/BCYBDFp2:a6jgsXdnPW8OYYBDFp2
Behavioral task
behavioral1
Sample
de24bf3e96b1d23c8d1dc974adca4d36_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
de24bf3e96b1d23c8d1dc974adca4d36_JaffaCakes118
-
Size
123KB
-
MD5
de24bf3e96b1d23c8d1dc974adca4d36
-
SHA1
c09a59bc8826f5f85d321726d41454a123f82864
-
SHA256
d0d933b572d7b3f782bd568a805965a896875e07319ab3bed0556e8d180c4efb
-
SHA512
57545b1d7839d1aadae29869b068bf0b3d99f8e28d29f4308934bb48058ab28048f18330e0df58327d2a10b7c3c15b7aa781f2db824a5ec993dfc31842fb0c9a
-
SSDEEP
3072:mt6pnukgsL3LA8MK48nGUFw8OoBTM/BCYBDFp2:a6jgsXdnPW8OYYBDFp2
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5