General
-
Target
e06026354858f1d8b4a512b211b6b842_JaffaCakes118
-
Size
120KB
-
Sample
241211-hw6vdaskgy
-
MD5
e06026354858f1d8b4a512b211b6b842
-
SHA1
6034302391ebf60bbd49bbf92bb95c60b2df5894
-
SHA256
f1e5cd4488c5b89648dcf6d0be041510a8435269f993a9f0c648dfea7d78bff9
-
SHA512
1a1acd1bd3183be6f7d60847bab65aa22dd78f64278d821eb6e122d1e53da690e344f9aa5952e7c350b386660eb337514352027b7317213476a9a4bfcaf064b2
-
SSDEEP
3072:0wBhO0+VOfsESiCfJ8cLSQop30LaGAWDWLoHTN:0QU8EESFBn2jpkdxGoHTN
Static task
static1
Behavioral task
behavioral1
Sample
e06026354858f1d8b4a512b211b6b842_JaffaCakes118.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e06026354858f1d8b4a512b211b6b842_JaffaCakes118
-
Size
120KB
-
MD5
e06026354858f1d8b4a512b211b6b842
-
SHA1
6034302391ebf60bbd49bbf92bb95c60b2df5894
-
SHA256
f1e5cd4488c5b89648dcf6d0be041510a8435269f993a9f0c648dfea7d78bff9
-
SHA512
1a1acd1bd3183be6f7d60847bab65aa22dd78f64278d821eb6e122d1e53da690e344f9aa5952e7c350b386660eb337514352027b7317213476a9a4bfcaf064b2
-
SSDEEP
3072:0wBhO0+VOfsESiCfJ8cLSQop30LaGAWDWLoHTN:0QU8EESFBn2jpkdxGoHTN
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5