General
-
Target
f20a7e9efd240b9d97df87604a3d41e9_JaffaCakes118
-
Size
100KB
-
Sample
241215-dt7lnssmd1
-
MD5
f20a7e9efd240b9d97df87604a3d41e9
-
SHA1
31eda3f0f23efe842fa2a89fac83f25f2465f521
-
SHA256
e70aa7651969ca8882711e2102620ebd7131207d07685b6fb6b86e6c7becdc0a
-
SHA512
df5e09b575ff067f9c73951191b07fffb1bbb29d23433999c3718e4b224a1161be818f82dbe26ff1496d9b69f9353ec8216bd8551b267549f673c86119edd965
-
SSDEEP
3072:C04xPaG9wN9dtQZjhd9QMn9RQtFmiJZ/AmbWxeC:CdPajtQZN9qm8LS0
Static task
static1
Behavioral task
behavioral1
Sample
f20a7e9efd240b9d97df87604a3d41e9_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
f20a7e9efd240b9d97df87604a3d41e9_JaffaCakes118
-
Size
100KB
-
MD5
f20a7e9efd240b9d97df87604a3d41e9
-
SHA1
31eda3f0f23efe842fa2a89fac83f25f2465f521
-
SHA256
e70aa7651969ca8882711e2102620ebd7131207d07685b6fb6b86e6c7becdc0a
-
SHA512
df5e09b575ff067f9c73951191b07fffb1bbb29d23433999c3718e4b224a1161be818f82dbe26ff1496d9b69f9353ec8216bd8551b267549f673c86119edd965
-
SSDEEP
3072:C04xPaG9wN9dtQZjhd9QMn9RQtFmiJZ/AmbWxeC:CdPajtQZN9qm8LS0
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5