General
-
Target
JaffaCakes118_335c2a851afb774d2f791c81971642d9
-
Size
298KB
-
Sample
250126-hmxkcavngy
-
MD5
335c2a851afb774d2f791c81971642d9
-
SHA1
03edc99622d42a7d835cca12dca68776a8eeb8c5
-
SHA256
7c35c1edabc4cf394ae493e9f7bb2f0ad896c0d031b540b633dcb7239498f4cd
-
SHA512
f31c425f6db6d0e8e23a9bf8ce5c7d6b9b84f14832962818e5cd451c35a4c39a05c9132732ee716a690b7c4df74f4717628e4df7fe227853d326ee0000c48c15
-
SSDEEP
6144:FRgym92YGB+40mPLGPAU7rr8pf39ZqIyM/8tv60seaqBRqNGsJEZ:X6fu+40mPIrrc3twvnBamqQ4W
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_335c2a851afb774d2f791c81971642d9.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
JaffaCakes118_335c2a851afb774d2f791c81971642d9
-
Size
298KB
-
MD5
335c2a851afb774d2f791c81971642d9
-
SHA1
03edc99622d42a7d835cca12dca68776a8eeb8c5
-
SHA256
7c35c1edabc4cf394ae493e9f7bb2f0ad896c0d031b540b633dcb7239498f4cd
-
SHA512
f31c425f6db6d0e8e23a9bf8ce5c7d6b9b84f14832962818e5cd451c35a4c39a05c9132732ee716a690b7c4df74f4717628e4df7fe227853d326ee0000c48c15
-
SSDEEP
6144:FRgym92YGB+40mPLGPAU7rr8pf39ZqIyM/8tv60seaqBRqNGsJEZ:X6fu+40mPIrrc3twvnBamqQ4W
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5