General
-
Target
f6e0c25936a6fe1f2dfd7c0c2a6cfb40_JaffaCakes118
-
Size
97KB
-
Sample
241216-cya8layrgv
-
MD5
f6e0c25936a6fe1f2dfd7c0c2a6cfb40
-
SHA1
3daef183f32d9c054721a319a7530c0980115f8c
-
SHA256
829549b3cc3c3798a7b34395b1914c1bfc095e960445e8a858068b95e3579fd8
-
SHA512
a4b5d01b6d2f122984b642d30ef540b6ae6134500af10d0e4f52c116b0fc8b94b38e0c994eba9abe17b85d650387b6e2ee9d5a944a9708cfd2ae423434550e14
-
SSDEEP
3072:nYP2Z7o3LiW9C2Tk3RjjgLjMel1KxSCXo1:nY8o7iWdTk3GjZf4Seo1
Static task
static1
Behavioral task
behavioral1
Sample
f6e0c25936a6fe1f2dfd7c0c2a6cfb40_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f6e0c25936a6fe1f2dfd7c0c2a6cfb40_JaffaCakes118
-
Size
97KB
-
MD5
f6e0c25936a6fe1f2dfd7c0c2a6cfb40
-
SHA1
3daef183f32d9c054721a319a7530c0980115f8c
-
SHA256
829549b3cc3c3798a7b34395b1914c1bfc095e960445e8a858068b95e3579fd8
-
SHA512
a4b5d01b6d2f122984b642d30ef540b6ae6134500af10d0e4f52c116b0fc8b94b38e0c994eba9abe17b85d650387b6e2ee9d5a944a9708cfd2ae423434550e14
-
SSDEEP
3072:nYP2Z7o3LiW9C2Tk3RjjgLjMel1KxSCXo1:nY8o7iWdTk3GjZf4Seo1
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5