General
-
Target
f28fcc7e1a94aa1cc97222897553972d_JaffaCakes118
-
Size
100KB
-
Sample
241215-gfaxbsxlhl
-
MD5
f28fcc7e1a94aa1cc97222897553972d
-
SHA1
2d5bfa7a0e203544d98e1a93de686a33cbd719fd
-
SHA256
cbf9b5c02572c50a7923cadaa51436e87cec342daf1e7fb3540d6e88b947c90c
-
SHA512
1f7d87f91b227a9b13edf426fe9404d17709b67702c28d700becc7c37ddbc45b53d12436b80737463a0e968dd9c12535036e7eb7a877a24f12f5bd5efcd7a25a
-
SSDEEP
1536:o6kPkYLISYlPFzqqPyChWQpR6eBfKsSkU0nuzeWEIPzHMe:AgSk1qqLWa6emktKtEgL
Static task
static1
Behavioral task
behavioral1
Sample
f28fcc7e1a94aa1cc97222897553972d_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
f28fcc7e1a94aa1cc97222897553972d_JaffaCakes118
-
Size
100KB
-
MD5
f28fcc7e1a94aa1cc97222897553972d
-
SHA1
2d5bfa7a0e203544d98e1a93de686a33cbd719fd
-
SHA256
cbf9b5c02572c50a7923cadaa51436e87cec342daf1e7fb3540d6e88b947c90c
-
SHA512
1f7d87f91b227a9b13edf426fe9404d17709b67702c28d700becc7c37ddbc45b53d12436b80737463a0e968dd9c12535036e7eb7a877a24f12f5bd5efcd7a25a
-
SSDEEP
1536:o6kPkYLISYlPFzqqPyChWQpR6eBfKsSkU0nuzeWEIPzHMe:AgSk1qqLWa6emktKtEgL
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5