General
-
Target
f205f6e8cacbbd148e21a24b3c10ed17_JaffaCakes118
-
Size
1.1MB
-
Sample
241215-dqtweatqgl
-
MD5
f205f6e8cacbbd148e21a24b3c10ed17
-
SHA1
0649ff54ce49cda6f8cd07fad39744fa862cb861
-
SHA256
e30ff9d7795169a4023147ff15c43b9789cd3b5863d3bd1c3cda35a6b51f6653
-
SHA512
33b35811566df540ff9a3de9147f928b1741c7a5eb57e029cd67ceab5df7ed5b5c9181e5b0455d63bcb8b94494f33b7ce19064c2b676a3444452c6fbb81efa25
-
SSDEEP
24576:sfPeOAIwFTtFvW5AbgyjHnHoTcz6PYn9:GeOmFvWAzroTu7n
Static task
static1
Behavioral task
behavioral1
Sample
f205f6e8cacbbd148e21a24b3c10ed17_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
f205f6e8cacbbd148e21a24b3c10ed17_JaffaCakes118
-
Size
1.1MB
-
MD5
f205f6e8cacbbd148e21a24b3c10ed17
-
SHA1
0649ff54ce49cda6f8cd07fad39744fa862cb861
-
SHA256
e30ff9d7795169a4023147ff15c43b9789cd3b5863d3bd1c3cda35a6b51f6653
-
SHA512
33b35811566df540ff9a3de9147f928b1741c7a5eb57e029cd67ceab5df7ed5b5c9181e5b0455d63bcb8b94494f33b7ce19064c2b676a3444452c6fbb81efa25
-
SSDEEP
24576:sfPeOAIwFTtFvW5AbgyjHnHoTcz6PYn9:GeOmFvWAzroTu7n
-
Modifies firewall policy service
-
Sality family
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6