General
-
Target
f601a77be56dcbe775e3d687ca1d1f9a_JaffaCakes118
-
Size
120KB
-
Sample
241215-2a17jszmgw
-
MD5
f601a77be56dcbe775e3d687ca1d1f9a
-
SHA1
4cc37204dc232bfef05c0b612d955073eb799c75
-
SHA256
2986d701b7aaf781e011b372f4054e05503968d5900a8394145a996839043e7d
-
SHA512
e6684d4fb40112bfe427305011c878a7e56ae596ee3030ab936ffe8d74870e4014970897b162c2447ebc768b54ef6f3f8fd06df09fd85441abafdd07fcc4e16c
-
SSDEEP
3072:QmV0MJUyUsdLuRZnBSPsZTriLlDOo22O+AG0xqJ4QoJ65pg/2H:QmVxJ7dKSUZTrQQ52O+/0JO56/2
Static task
static1
Behavioral task
behavioral1
Sample
f601a77be56dcbe775e3d687ca1d1f9a_JaffaCakes118.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f601a77be56dcbe775e3d687ca1d1f9a_JaffaCakes118
-
Size
120KB
-
MD5
f601a77be56dcbe775e3d687ca1d1f9a
-
SHA1
4cc37204dc232bfef05c0b612d955073eb799c75
-
SHA256
2986d701b7aaf781e011b372f4054e05503968d5900a8394145a996839043e7d
-
SHA512
e6684d4fb40112bfe427305011c878a7e56ae596ee3030ab936ffe8d74870e4014970897b162c2447ebc768b54ef6f3f8fd06df09fd85441abafdd07fcc4e16c
-
SSDEEP
3072:QmV0MJUyUsdLuRZnBSPsZTriLlDOo22O+AG0xqJ4QoJ65pg/2H:QmVxJ7dKSUZTrQQ52O+/0JO56/2
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5