General
-
Target
f1d91b0bd10d9d026aac1fa3139a306f_JaffaCakes118
-
Size
100KB
-
Sample
241215-ctw99s1nht
-
MD5
f1d91b0bd10d9d026aac1fa3139a306f
-
SHA1
96582a0adb131012dcacd4d3254350eab06ad3b3
-
SHA256
c45bf646139646c7851cde0eaefe068ef9f445dbd737cb0740a60d7bbad5c24a
-
SHA512
7a0105b611c4f1eb62879ebe635d2d344f155368508cf61f7fa3fee945b0fad79fbef0955318e8380f26dbf103ccb61fcdf5cbe4abcc7da168fcbb7cd66c4af8
-
SSDEEP
3072:DJCc0oYnO+ZvYWCXT3YKG9jjzBzQGwIcNSWLF7XCl:lpJ+9psTY/xjzxjwIcIWCl
Static task
static1
Behavioral task
behavioral1
Sample
f1d91b0bd10d9d026aac1fa3139a306f_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
f1d91b0bd10d9d026aac1fa3139a306f_JaffaCakes118
-
Size
100KB
-
MD5
f1d91b0bd10d9d026aac1fa3139a306f
-
SHA1
96582a0adb131012dcacd4d3254350eab06ad3b3
-
SHA256
c45bf646139646c7851cde0eaefe068ef9f445dbd737cb0740a60d7bbad5c24a
-
SHA512
7a0105b611c4f1eb62879ebe635d2d344f155368508cf61f7fa3fee945b0fad79fbef0955318e8380f26dbf103ccb61fcdf5cbe4abcc7da168fcbb7cd66c4af8
-
SSDEEP
3072:DJCc0oYnO+ZvYWCXT3YKG9jjzBzQGwIcNSWLF7XCl:lpJ+9psTY/xjzxjwIcIWCl
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5