General
-
Target
f302ca4e131cb9890daca5810413d7a9_JaffaCakes118
-
Size
100KB
-
Sample
241215-jpc46azlfj
-
MD5
f302ca4e131cb9890daca5810413d7a9
-
SHA1
226a176e3a9e58de607f1d1f8fe1e9021b0f6eab
-
SHA256
b77bf8ad88c378093884fbef71ba0d00bd862a8225f93013e47a7be6f1a3d752
-
SHA512
f7ee9927939160bc1411699f23a7a480443dac7666650b6f0017f886d288d4e7eef5e3bff0b021f6f5bcb194163bfe66ac6b7f9909f2869d9659bbae85c05eb1
-
SSDEEP
1536:DnQx4VPEY5QTP6cgI89s/W11VmYhOBmxoCLxuf7ciBjGHdr5QlaxX:a4VPTQP69/mO1VmRBmOOujlG3Q
Static task
static1
Behavioral task
behavioral1
Sample
f302ca4e131cb9890daca5810413d7a9_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
f302ca4e131cb9890daca5810413d7a9_JaffaCakes118
-
Size
100KB
-
MD5
f302ca4e131cb9890daca5810413d7a9
-
SHA1
226a176e3a9e58de607f1d1f8fe1e9021b0f6eab
-
SHA256
b77bf8ad88c378093884fbef71ba0d00bd862a8225f93013e47a7be6f1a3d752
-
SHA512
f7ee9927939160bc1411699f23a7a480443dac7666650b6f0017f886d288d4e7eef5e3bff0b021f6f5bcb194163bfe66ac6b7f9909f2869d9659bbae85c05eb1
-
SSDEEP
1536:DnQx4VPEY5QTP6cgI89s/W11VmYhOBmxoCLxuf7ciBjGHdr5QlaxX:a4VPTQP69/mO1VmRBmOOujlG3Q
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5