General
-
Target
JaffaCakes118_4703e89c0ec5ce23bbafe0d495ef6020
-
Size
198KB
-
Sample
250101-ezz98avkas
-
MD5
4703e89c0ec5ce23bbafe0d495ef6020
-
SHA1
7ca4c5ba768ef8a617acf0e5691ddc4312649232
-
SHA256
4cb383c189fe2400fe074f104d109ba2db8f76b0e0d3833fa033649f726d9a7c
-
SHA512
51667038eca90cb221fd2a28e23b58907b35ab506b1ca7b8b056631af4a6f3f74c3eb4fa7b1d06d7f3c726bde1c9e387a4392cb564ee36e41a043d599b06143c
-
SSDEEP
3072:kiULt2ABkPm97ff1+jUks+zzvm089iBkGRq0j27QxjUVEDm:It2EkPm97f9+jDzC0UiBkfQUVd
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4703e89c0ec5ce23bbafe0d495ef6020.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_4703e89c0ec5ce23bbafe0d495ef6020
-
Size
198KB
-
MD5
4703e89c0ec5ce23bbafe0d495ef6020
-
SHA1
7ca4c5ba768ef8a617acf0e5691ddc4312649232
-
SHA256
4cb383c189fe2400fe074f104d109ba2db8f76b0e0d3833fa033649f726d9a7c
-
SHA512
51667038eca90cb221fd2a28e23b58907b35ab506b1ca7b8b056631af4a6f3f74c3eb4fa7b1d06d7f3c726bde1c9e387a4392cb564ee36e41a043d599b06143c
-
SSDEEP
3072:kiULt2ABkPm97ff1+jUks+zzvm089iBkGRq0j27QxjUVEDm:It2EkPm97f9+jDzC0UiBkfQUVd
-
Modifies firewall policy service
-
Sality family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5