General
-
Target
JaffaCakes118_3a852a7343df0d910d639551500c104d
-
Size
140KB
-
Sample
250127-azzlgasqdq
-
MD5
3a852a7343df0d910d639551500c104d
-
SHA1
3f24ee56fdc82709e6e3299ca00a591a54a4a5f4
-
SHA256
1a0947a40d1a542192358f817aa0cebad90c469e3cc480520a16aa52d747fd1b
-
SHA512
34185e67c24ff2716115643c4578932f17819e0382914f13cbccb6df20fb8c6f1d3559dc28d0d5f55e835f57b9eca3ee9bd576f0e1429a940ae186ed446c4cad
-
SSDEEP
3072:n4kZoq+J+Io4LRse9XSVQ53j1RVtNZEybGDPM263:4ko5siL5FeQFj1Ryc
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3a852a7343df0d910d639551500c104d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3a852a7343df0d910d639551500c104d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_3a852a7343df0d910d639551500c104d
-
Size
140KB
-
MD5
3a852a7343df0d910d639551500c104d
-
SHA1
3f24ee56fdc82709e6e3299ca00a591a54a4a5f4
-
SHA256
1a0947a40d1a542192358f817aa0cebad90c469e3cc480520a16aa52d747fd1b
-
SHA512
34185e67c24ff2716115643c4578932f17819e0382914f13cbccb6df20fb8c6f1d3559dc28d0d5f55e835f57b9eca3ee9bd576f0e1429a940ae186ed446c4cad
-
SSDEEP
3072:n4kZoq+J+Io4LRse9XSVQ53j1RVtNZEybGDPM263:4ko5siL5FeQFj1Ryc
-
Modifies firewall policy service
-
Modifies visibility of file extensions in Explorer
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7