General
-
Target
f6e45c11188d32b43b7608e2664db42a_JaffaCakes118
-
Size
100KB
-
Sample
241216-czyqaa1mfj
-
MD5
f6e45c11188d32b43b7608e2664db42a
-
SHA1
e152db20d5e671f0db97a6f6e8185a965e6537c4
-
SHA256
df126260b487fb2dbd7ea20c679d5bbd6209239688c419e03232188221cba89c
-
SHA512
ee47a7f76fb737d27a22f905f1e62de7047131786ef0ca378b1616e3966249d8e6ab7fad5bbca87f656453622b84b8f43df29a38113b211986a8195f4a182a79
-
SSDEEP
3072:nQJcQJyPPmoBp7eNIKAfKgJ0gWNtxTK8Uz:nqcBp7ei7ygJnsxlU
Static task
static1
Behavioral task
behavioral1
Sample
f6e45c11188d32b43b7608e2664db42a_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
f6e45c11188d32b43b7608e2664db42a_JaffaCakes118
-
Size
100KB
-
MD5
f6e45c11188d32b43b7608e2664db42a
-
SHA1
e152db20d5e671f0db97a6f6e8185a965e6537c4
-
SHA256
df126260b487fb2dbd7ea20c679d5bbd6209239688c419e03232188221cba89c
-
SHA512
ee47a7f76fb737d27a22f905f1e62de7047131786ef0ca378b1616e3966249d8e6ab7fad5bbca87f656453622b84b8f43df29a38113b211986a8195f4a182a79
-
SSDEEP
3072:nQJcQJyPPmoBp7eNIKAfKgJ0gWNtxTK8Uz:nqcBp7ei7ygJnsxlU
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5