General
-
Target
f2632bd49f37cdf681b187438e4f6173_JaffaCakes118
-
Size
3.2MB
-
Sample
241215-fhvh3svkdx
-
MD5
f2632bd49f37cdf681b187438e4f6173
-
SHA1
13b11925bc8f7c0a3f76eca2d70fe06b44e3e245
-
SHA256
11f71273e6d5522c3551ab840e062442de9328ed2b2117b98ab3adb80f7cc822
-
SHA512
08b2d1b400fd625cd997b3046db49189563419ef4ae9c47bfb28ee9a622d51450bd01613f8f549a88fa7bf4229c476b1e18369fe2088956dc00de0ad530347ef
-
SSDEEP
49152:ghPg95YC1yRr5R+jzA66ymAu1Rg48D9d5VGoemcYVeGaY0uWV355FXw/+fuWV35j:EgXt1yRr8zA6POvwga
Static task
static1
Behavioral task
behavioral1
Sample
f2632bd49f37cdf681b187438e4f6173_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f2632bd49f37cdf681b187438e4f6173_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f2632bd49f37cdf681b187438e4f6173_JaffaCakes118
-
Size
3.2MB
-
MD5
f2632bd49f37cdf681b187438e4f6173
-
SHA1
13b11925bc8f7c0a3f76eca2d70fe06b44e3e245
-
SHA256
11f71273e6d5522c3551ab840e062442de9328ed2b2117b98ab3adb80f7cc822
-
SHA512
08b2d1b400fd625cd997b3046db49189563419ef4ae9c47bfb28ee9a622d51450bd01613f8f549a88fa7bf4229c476b1e18369fe2088956dc00de0ad530347ef
-
SSDEEP
49152:ghPg95YC1yRr5R+jzA66ymAu1Rg48D9d5VGoemcYVeGaY0uWV355FXw/+fuWV35j:EgXt1yRr8zA6POvwga
-
Sality family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Deletes itself
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5