General
-
Target
JaffaCakes118_4b94ac8c72c67bca44a6187cb14392db
-
Size
100KB
-
Sample
250101-hvwb9axrfs
-
MD5
4b94ac8c72c67bca44a6187cb14392db
-
SHA1
bd37a39433b4b7071cc2cf63db0d2a86590c0c67
-
SHA256
022f0507c36252581ed81bf6fc96c53069e6e7ca42b8c99b2328066b8d8dfc06
-
SHA512
a6ed7abd9163f3a27e69d1f834e8a42cccd81190707efafbbc1a272dbfb10f838b5b3ab2760a556efecad57ce831f74d4fbbf1dc378d8eaefc7eccb84bb8b8b0
-
SSDEEP
3072:vvXmFpzHRpiZ+n++Qcc83SJ3XeFoKRPP3MObiEUCcKH3:vvXajuDTR3AoKR8oiB+3
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4b94ac8c72c67bca44a6187cb14392db.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_4b94ac8c72c67bca44a6187cb14392db
-
Size
100KB
-
MD5
4b94ac8c72c67bca44a6187cb14392db
-
SHA1
bd37a39433b4b7071cc2cf63db0d2a86590c0c67
-
SHA256
022f0507c36252581ed81bf6fc96c53069e6e7ca42b8c99b2328066b8d8dfc06
-
SHA512
a6ed7abd9163f3a27e69d1f834e8a42cccd81190707efafbbc1a272dbfb10f838b5b3ab2760a556efecad57ce831f74d4fbbf1dc378d8eaefc7eccb84bb8b8b0
-
SSDEEP
3072:vvXmFpzHRpiZ+n++Qcc83SJ3XeFoKRPP3MObiEUCcKH3:vvXajuDTR3AoKR8oiB+3
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5