General
-
Target
JaffaCakes118_446c6cceecd7f0028cba744efcbb7097
-
Size
923KB
-
Sample
250127-2ts1aaypcn
-
MD5
446c6cceecd7f0028cba744efcbb7097
-
SHA1
ae7653ccc711e0f4846f85ade75e97f9384d61c1
-
SHA256
3df00745af3a52c35c0df1108c8d2121666d972af4bf2bdb913d1e5c64649830
-
SHA512
00d0c129c127f94264a043101ec1527a098f105c87af16cb4b3f2b4db4593bcabd1433831f925223fc6506f28c884bd04dd0eea6fdd17d8e5aff14e9be3adc77
-
SSDEEP
24576:ipm8d+paw4T/5IQ2KgoOLErprzU/V3ZitQh0vt8/:IxSKgoOLE9MKCau
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_446c6cceecd7f0028cba744efcbb7097.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_446c6cceecd7f0028cba744efcbb7097
-
Size
923KB
-
MD5
446c6cceecd7f0028cba744efcbb7097
-
SHA1
ae7653ccc711e0f4846f85ade75e97f9384d61c1
-
SHA256
3df00745af3a52c35c0df1108c8d2121666d972af4bf2bdb913d1e5c64649830
-
SHA512
00d0c129c127f94264a043101ec1527a098f105c87af16cb4b3f2b4db4593bcabd1433831f925223fc6506f28c884bd04dd0eea6fdd17d8e5aff14e9be3adc77
-
SSDEEP
24576:ipm8d+paw4T/5IQ2KgoOLErprzU/V3ZitQh0vt8/:IxSKgoOLE9MKCau
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Virtualization/Sandbox Evasion
1