General
-
Target
JaffaCakes118_44d434c73772679b9fd27ac8a247000d
-
Size
510KB
-
Sample
250101-dj2mnsslhv
-
MD5
44d434c73772679b9fd27ac8a247000d
-
SHA1
c178bbbacd12fdac2c5c107da0b15fcf487e79d8
-
SHA256
3512da478f3e757315f1061b015a3b5016ee45755b3cc341506f5a1272832c3c
-
SHA512
91ed354cd5af97db12caf267be240f6f1cbd61dd92edda695346140fbb367722ede1d2e59201296f242fcf9b887e4ae6806bb35da0a14ac009b31efe75805c29
-
SSDEEP
12288:W4dNeMEumiULIoPDiV4qWW5b+FXZ/becJ+G8:WniVPhSRZyR
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_44d434c73772679b9fd27ac8a247000d.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_44d434c73772679b9fd27ac8a247000d
-
Size
510KB
-
MD5
44d434c73772679b9fd27ac8a247000d
-
SHA1
c178bbbacd12fdac2c5c107da0b15fcf487e79d8
-
SHA256
3512da478f3e757315f1061b015a3b5016ee45755b3cc341506f5a1272832c3c
-
SHA512
91ed354cd5af97db12caf267be240f6f1cbd61dd92edda695346140fbb367722ede1d2e59201296f242fcf9b887e4ae6806bb35da0a14ac009b31efe75805c29
-
SSDEEP
12288:W4dNeMEumiULIoPDiV4qWW5b+FXZ/becJ+G8:WniVPhSRZyR
-
Modifies firewall policy service
-
Ramnit family
-
Sality family
-
Drops file in Drivers directory
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6