General
-
Target
ec3ede31f743977ae67873a534fe698e_JaffaCakes118
-
Size
100KB
-
Sample
241213-s94x2stjfw
-
MD5
ec3ede31f743977ae67873a534fe698e
-
SHA1
f941239dadec138334c0bcd03edee83680c1eef5
-
SHA256
dd71a7d45206d352dbee039c0f4b8f1370b100703f7ed13268e8ebb6b6566df1
-
SHA512
6e62b3f1d419f5a73abf4dc6b142885da0a20380a97dac0762466db74638f2f9eeb52d2cb111a56a2693f5b9993f82d092c325baca1660f73cd74849f19a1c9c
-
SSDEEP
1536:zAwXfrjUpB51t8cOwCVrXB2yaW/8HvMAyDaSetMoQFQC5QDlMgefdBRF5x5dR45:jXDm51mwCVrXB7tUDyDRFhQhxU5/6
Static task
static1
Behavioral task
behavioral1
Sample
ec3ede31f743977ae67873a534fe698e_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
ec3ede31f743977ae67873a534fe698e_JaffaCakes118
-
Size
100KB
-
MD5
ec3ede31f743977ae67873a534fe698e
-
SHA1
f941239dadec138334c0bcd03edee83680c1eef5
-
SHA256
dd71a7d45206d352dbee039c0f4b8f1370b100703f7ed13268e8ebb6b6566df1
-
SHA512
6e62b3f1d419f5a73abf4dc6b142885da0a20380a97dac0762466db74638f2f9eeb52d2cb111a56a2693f5b9993f82d092c325baca1660f73cd74849f19a1c9c
-
SSDEEP
1536:zAwXfrjUpB51t8cOwCVrXB2yaW/8HvMAyDaSetMoQFQC5QDlMgefdBRF5x5dR45:jXDm51mwCVrXB7tUDyDRFhQhxU5/6
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5