General
-
Target
eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118
-
Size
376KB
-
Sample
241213-m5761sxrhq
-
MD5
eb34748365c13012b9ac9cc72f7239a9
-
SHA1
2b3950148a078a0973493f149eaaf43cc99dba52
-
SHA256
eb521d50384f45b31ad8fd002b48429febdee7c02866ab752631f27b42b0721e
-
SHA512
bffe9c7dc112645f9ab698ebd67364614b5f2206bb7092ab657e2966c784fefbc680d9e62f9a61b6480005e954694645da3f2ddf66c44c3630a8b41f6b85309e
-
SSDEEP
3072:AmKxZkvuz8WClBs3zTiFGns5X7z4hJgKVES3Esv:A9kDlyjTiysJEJTCS
Static task
static1
Behavioral task
behavioral1
Sample
eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118
-
Size
376KB
-
MD5
eb34748365c13012b9ac9cc72f7239a9
-
SHA1
2b3950148a078a0973493f149eaaf43cc99dba52
-
SHA256
eb521d50384f45b31ad8fd002b48429febdee7c02866ab752631f27b42b0721e
-
SHA512
bffe9c7dc112645f9ab698ebd67364614b5f2206bb7092ab657e2966c784fefbc680d9e62f9a61b6480005e954694645da3f2ddf66c44c3630a8b41f6b85309e
-
SSDEEP
3072:AmKxZkvuz8WClBs3zTiFGns5X7z4hJgKVES3Esv:A9kDlyjTiysJEJTCS
-
Modifies firewall policy service
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Sality family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
9