General
-
Target
ef6afc872b4cf238c0c56636fed5614c_JaffaCakes118
-
Size
120KB
-
Sample
241214-ssf5nawmet
-
MD5
ef6afc872b4cf238c0c56636fed5614c
-
SHA1
21aff7b2f4319ab4ca3181ecdd63386f322ef26b
-
SHA256
da74a00398c985093dd924634a4ee68c85c06e11524aa9a123664ca84bdd97f4
-
SHA512
8578558c2f1ae972cb8ea0cf97afefb896598d2990b0dac6a843382f0e3c006647de248172307be6d96121a28255900ab95ee3e56f4b7f2a3490842abc5d0e67
-
SSDEEP
1536:jR1+BakhbsKQ0nEsvSRAGrCEqu9jq/hbHyy4LfQnuHTO7ZUp0zeyZ8K8w6:jREIcn/E8NGrCE/q/VBMIyuUp0zl8w
Static task
static1
Behavioral task
behavioral1
Sample
ef6afc872b4cf238c0c56636fed5614c_JaffaCakes118.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ef6afc872b4cf238c0c56636fed5614c_JaffaCakes118
-
Size
120KB
-
MD5
ef6afc872b4cf238c0c56636fed5614c
-
SHA1
21aff7b2f4319ab4ca3181ecdd63386f322ef26b
-
SHA256
da74a00398c985093dd924634a4ee68c85c06e11524aa9a123664ca84bdd97f4
-
SHA512
8578558c2f1ae972cb8ea0cf97afefb896598d2990b0dac6a843382f0e3c006647de248172307be6d96121a28255900ab95ee3e56f4b7f2a3490842abc5d0e67
-
SSDEEP
1536:jR1+BakhbsKQ0nEsvSRAGrCEqu9jq/hbHyy4LfQnuHTO7ZUp0zeyZ8K8w6:jREIcn/E8NGrCE/q/VBMIyuUp0zl8w
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5