General
-
Target
fa678b54bc6dc42ca74ab104203475fe_JaffaCakes118
-
Size
951KB
-
Sample
241218-gw5rmsxqbm
-
MD5
fa678b54bc6dc42ca74ab104203475fe
-
SHA1
151df3753808b3d44b5a5255c820c8b928658c1c
-
SHA256
38e98d7bea3c4297e939f8940dc3c2855caecea427156dbe001ea43d03d4a947
-
SHA512
e893d49a446900fbfda12b1a2540a478132db22214fa849e3d95b7b6b8be6783a4e116e614fcde7afe731323492963219aec0cbd21797905ecea74af5b142af2
-
SSDEEP
24576:SUFa7K4Jy/fVtktVGPrfO/WxvaXUTcLHFpSYiVtktVGPrfO/WX:jqMlSyfO/WxyXukHFISyfO/W
Static task
static1
Behavioral task
behavioral1
Sample
fa678b54bc6dc42ca74ab104203475fe_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa678b54bc6dc42ca74ab104203475fe_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
fa678b54bc6dc42ca74ab104203475fe_JaffaCakes118
-
Size
951KB
-
MD5
fa678b54bc6dc42ca74ab104203475fe
-
SHA1
151df3753808b3d44b5a5255c820c8b928658c1c
-
SHA256
38e98d7bea3c4297e939f8940dc3c2855caecea427156dbe001ea43d03d4a947
-
SHA512
e893d49a446900fbfda12b1a2540a478132db22214fa849e3d95b7b6b8be6783a4e116e614fcde7afe731323492963219aec0cbd21797905ecea74af5b142af2
-
SSDEEP
24576:SUFa7K4Jy/fVtktVGPrfO/WxvaXUTcLHFpSYiVtktVGPrfO/WX:jqMlSyfO/WxyXukHFISyfO/W
-
Modifies firewall policy service
-
Sality family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
5Disable or Modify System Firewall
2Disable or Modify Tools
3Modify Registry
6