General
-
Target
e88c125e3bba0963ae3ba93ace24ef7c_JaffaCakes118
-
Size
120KB
-
Sample
241212-19jacayrfv
-
MD5
e88c125e3bba0963ae3ba93ace24ef7c
-
SHA1
c08ae9b948ba15e6711e0d761c4001cdc95a7726
-
SHA256
f2f7a6f71893d871a43c754d6f0fbd2e1615461d0c7e7242586a79f95492ffcd
-
SHA512
6103450b5daa47db11bf85e798947db8c3e5aa3dfaa3353f48703829b4557bbfc050777ac7fcc0c3db7504ab84b707b9d34997c96c607279e43ed04754f365a1
-
SSDEEP
3072:IGuEOSCpKooYHF+rZCRh0wVF1q9E0Dj/MzCtVW5zrJUlaC7KYXd:ySlYlsUD0wVp0Dj/9+5PJBihd
Static task
static1
Behavioral task
behavioral1
Sample
e88c125e3bba0963ae3ba93ace24ef7c_JaffaCakes118.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e88c125e3bba0963ae3ba93ace24ef7c_JaffaCakes118
-
Size
120KB
-
MD5
e88c125e3bba0963ae3ba93ace24ef7c
-
SHA1
c08ae9b948ba15e6711e0d761c4001cdc95a7726
-
SHA256
f2f7a6f71893d871a43c754d6f0fbd2e1615461d0c7e7242586a79f95492ffcd
-
SHA512
6103450b5daa47db11bf85e798947db8c3e5aa3dfaa3353f48703829b4557bbfc050777ac7fcc0c3db7504ab84b707b9d34997c96c607279e43ed04754f365a1
-
SSDEEP
3072:IGuEOSCpKooYHF+rZCRh0wVF1q9E0Dj/MzCtVW5zrJUlaC7KYXd:ySlYlsUD0wVp0Dj/9+5PJBihd
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5