General
-
Target
JaffaCakes118_36dd1c8a2c66a86e38345cbe9d296db4
-
Size
100KB
-
Sample
250126-s3pvjsvqd1
-
MD5
36dd1c8a2c66a86e38345cbe9d296db4
-
SHA1
49f12a57f24d8305d858b8d7346473f6ef01526e
-
SHA256
31c5ff93db7861b33b3a7cffd26bcda68b21645936597fdb335a99d37f9f24b3
-
SHA512
eccc47f5a8920e5892fee0e1eee9bcfa2923f92a812cc4d6a8c6576fd688b4481f267861dabb66a3c9847595d2ff4eed32028cc50341e0f1d1f237cb54938468
-
SSDEEP
3072:0bqoj9YCosZUsPmUyFHak/w3PIdrCCSRk:iVZYC/eUyFd8Cy
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_36dd1c8a2c66a86e38345cbe9d296db4.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_36dd1c8a2c66a86e38345cbe9d296db4
-
Size
100KB
-
MD5
36dd1c8a2c66a86e38345cbe9d296db4
-
SHA1
49f12a57f24d8305d858b8d7346473f6ef01526e
-
SHA256
31c5ff93db7861b33b3a7cffd26bcda68b21645936597fdb335a99d37f9f24b3
-
SHA512
eccc47f5a8920e5892fee0e1eee9bcfa2923f92a812cc4d6a8c6576fd688b4481f267861dabb66a3c9847595d2ff4eed32028cc50341e0f1d1f237cb54938468
-
SSDEEP
3072:0bqoj9YCosZUsPmUyFHak/w3PIdrCCSRk:iVZYC/eUyFd8Cy
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5