General
-
Target
eb38ba61b3c22e19149e2d948474b1ac_JaffaCakes118
-
Size
368KB
-
Sample
241213-m8yfzsyjej
-
MD5
eb38ba61b3c22e19149e2d948474b1ac
-
SHA1
157ea630320b17d6f4a5b09c23f3c67731110aa2
-
SHA256
a45cf3fc6c063e10c497e08e113d740cec7644ea6fc4a66dcaf6ef67cc3998e9
-
SHA512
9d0a5e0b98263d8b350b08e5f17646b7b243fee4a7ae3507aed6514df0eede9b0bb5d5ed65c8c025f99f95c68bf4e31f45abb7cba694064995e3c44c3423f15c
-
SSDEEP
6144:DIzAfPRA21I0RC1XHny6Gm0JVfNauLN6OLTXTU2Lo9jH29Ug8IKgZk2oIvf:D3fPmr0Q1XHyfmcF3TXT3LoZkUg8+kNQ
Static task
static1
Behavioral task
behavioral1
Sample
eb38ba61b3c22e19149e2d948474b1ac_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
eb38ba61b3c22e19149e2d948474b1ac_JaffaCakes118
-
Size
368KB
-
MD5
eb38ba61b3c22e19149e2d948474b1ac
-
SHA1
157ea630320b17d6f4a5b09c23f3c67731110aa2
-
SHA256
a45cf3fc6c063e10c497e08e113d740cec7644ea6fc4a66dcaf6ef67cc3998e9
-
SHA512
9d0a5e0b98263d8b350b08e5f17646b7b243fee4a7ae3507aed6514df0eede9b0bb5d5ed65c8c025f99f95c68bf4e31f45abb7cba694064995e3c44c3423f15c
-
SSDEEP
6144:DIzAfPRA21I0RC1XHny6Gm0JVfNauLN6OLTXTU2Lo9jH29Ug8IKgZk2oIvf:D3fPmr0Q1XHyfmcF3TXT3LoZkUg8+kNQ
-
Modifies firewall policy service
-
Sality family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5