General
-
Target
JaffaCakes118_09759729987ce000bb838e9fda3b6ff0
-
Size
952KB
-
Sample
241231-hmcj6szken
-
MD5
09759729987ce000bb838e9fda3b6ff0
-
SHA1
5fe3bd1f39a1a6cc465332a482db605c13cee4f3
-
SHA256
2461aedc90f1dc0443050180fe92cc19ee0d3c20ef1184b03849103d46f07e10
-
SHA512
be3210c84c322c149297b4c4cb95603135e436f17c21951d0654279640cf0a187c714bf4d9f480d07790d9958e01c5b0aac19cf8b57f58344fad80cced725902
-
SSDEEP
12288:btpvoJQSYfFyv+LtpvoJQktpvoJQktpvoJQ:btpvolYfFyv+Ltpvo7tpvo7tpvo
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_09759729987ce000bb838e9fda3b6ff0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_09759729987ce000bb838e9fda3b6ff0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
JaffaCakes118_09759729987ce000bb838e9fda3b6ff0
-
Size
952KB
-
MD5
09759729987ce000bb838e9fda3b6ff0
-
SHA1
5fe3bd1f39a1a6cc465332a482db605c13cee4f3
-
SHA256
2461aedc90f1dc0443050180fe92cc19ee0d3c20ef1184b03849103d46f07e10
-
SHA512
be3210c84c322c149297b4c4cb95603135e436f17c21951d0654279640cf0a187c714bf4d9f480d07790d9958e01c5b0aac19cf8b57f58344fad80cced725902
-
SSDEEP
12288:btpvoJQSYfFyv+LtpvoJQktpvoJQktpvoJQ:btpvolYfFyv+Ltpvo7tpvo7tpvo
-
Sality family
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Change Default File Association
1Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Change Default File Association
1Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7