General
-
Target
e576fdd01cc278d8b66abf03f358e868_JaffaCakes118
-
Size
340KB
-
Sample
241212-j4lpvaxrct
-
MD5
e576fdd01cc278d8b66abf03f358e868
-
SHA1
298a63b10b51dc631086ddfe4fea259958075ef9
-
SHA256
c7b334f5e2c37cb0a4a0c82a558fcb8d71e253ae41fc44dca94f20293d1000b6
-
SHA512
86d9553c4a65e49ce4434346fb232bc7e9a1d2d1f8a65b7ea496e570ab6cc10ce4c2cd168ac8ec2e12c5e40cd9f9a75922936ecf6aa2f11d070c7ff8156abf60
-
SSDEEP
6144:9lSRC9ZedyYcxRgU3uVy/3DLQxqnbAqjv0MAQ6Y7JsDx7wqwMY/rSk5oGXktIjJJ:9lSQ9ZeAYcHg18PDccbLjcMAQqDxQMyl
Static task
static1
Behavioral task
behavioral1
Sample
e576fdd01cc278d8b66abf03f358e868_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
e576fdd01cc278d8b66abf03f358e868_JaffaCakes118
-
Size
340KB
-
MD5
e576fdd01cc278d8b66abf03f358e868
-
SHA1
298a63b10b51dc631086ddfe4fea259958075ef9
-
SHA256
c7b334f5e2c37cb0a4a0c82a558fcb8d71e253ae41fc44dca94f20293d1000b6
-
SHA512
86d9553c4a65e49ce4434346fb232bc7e9a1d2d1f8a65b7ea496e570ab6cc10ce4c2cd168ac8ec2e12c5e40cd9f9a75922936ecf6aa2f11d070c7ff8156abf60
-
SSDEEP
6144:9lSRC9ZedyYcxRgU3uVy/3DLQxqnbAqjv0MAQ6Y7JsDx7wqwMY/rSk5oGXktIjJJ:9lSQ9ZeAYcHg18PDccbLjcMAQqDxQMyl
-
Modifies firewall policy service
-
Sality family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5