General
-
Target
e368682944a64fda7b63fe7f78894428_JaffaCakes118
-
Size
100KB
-
Sample
241211-1whfwszmbw
-
MD5
e368682944a64fda7b63fe7f78894428
-
SHA1
4cf7eb2f0814ad2fdce1f5b4f7162359de5058d8
-
SHA256
c43953e66e374a16c67b51c93af34de6ae4216eb3acf62d3908d93399dbb5862
-
SHA512
30037b6d71537ed590e364e543a25054ffe3d9f5fd20464f73555d1cf1cf9e14415caae26d2682cb9234d55c7d22705aef8464e3d2c4ad69bc626131651464b1
-
SSDEEP
1536:D3UkKdu7IM27H3/9JWMOBxL3FSyDRzhCNNELNww/zP63eaAcrwyr8uFp/bn:+oUn7HEjFXDRzkNiLaI6FAcrdw4Fbn
Static task
static1
Behavioral task
behavioral1
Sample
e368682944a64fda7b63fe7f78894428_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
e368682944a64fda7b63fe7f78894428_JaffaCakes118
-
Size
100KB
-
MD5
e368682944a64fda7b63fe7f78894428
-
SHA1
4cf7eb2f0814ad2fdce1f5b4f7162359de5058d8
-
SHA256
c43953e66e374a16c67b51c93af34de6ae4216eb3acf62d3908d93399dbb5862
-
SHA512
30037b6d71537ed590e364e543a25054ffe3d9f5fd20464f73555d1cf1cf9e14415caae26d2682cb9234d55c7d22705aef8464e3d2c4ad69bc626131651464b1
-
SSDEEP
1536:D3UkKdu7IM27H3/9JWMOBxL3FSyDRzhCNNELNww/zP63eaAcrwyr8uFp/bn:+oUn7HEjFXDRzkNiLaI6FAcrdw4Fbn
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5