General
-
Target
f2cbe5d9afe90e780e0c4728399139ca_JaffaCakes118
-
Size
100KB
-
Sample
241215-hlrmpswrfy
-
MD5
f2cbe5d9afe90e780e0c4728399139ca
-
SHA1
742db763fe1eb48345e344a698d06eab93458256
-
SHA256
5db8c1a655565351f6586c947d5321ce7a1427b60053b7d43cd5b5c7859b443c
-
SHA512
261f277b8b26c33dce126a0c0e9bef05c28f0cab9d1d62fee39ef21a54f0c915b93101b369e2e1f78984d6f32b4d88e584aebf242b5b881e5a17d96ea3102328
-
SSDEEP
1536:IaYG1FV5Xs+csPGBrTlQJAREabXk0HS6BJGagnEL4ukbSlFeqNvUxETABRe:RYcLs+zeBrTIAyUSAAEL4HNqmE0w
Static task
static1
Behavioral task
behavioral1
Sample
f2cbe5d9afe90e780e0c4728399139ca_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
f2cbe5d9afe90e780e0c4728399139ca_JaffaCakes118
-
Size
100KB
-
MD5
f2cbe5d9afe90e780e0c4728399139ca
-
SHA1
742db763fe1eb48345e344a698d06eab93458256
-
SHA256
5db8c1a655565351f6586c947d5321ce7a1427b60053b7d43cd5b5c7859b443c
-
SHA512
261f277b8b26c33dce126a0c0e9bef05c28f0cab9d1d62fee39ef21a54f0c915b93101b369e2e1f78984d6f32b4d88e584aebf242b5b881e5a17d96ea3102328
-
SSDEEP
1536:IaYG1FV5Xs+csPGBrTlQJAREabXk0HS6BJGagnEL4ukbSlFeqNvUxETABRe:RYcLs+zeBrTIAyUSAAEL4HNqmE0w
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5