General
-
Target
JaffaCakes118_3c49fc1679c89b4a1245c373ce305bab
-
Size
100KB
-
Sample
250127-fylacasqes
-
MD5
3c49fc1679c89b4a1245c373ce305bab
-
SHA1
292c48af173dcdd0b13e8f7fb76b55f320b251aa
-
SHA256
28af586e81a623ae6adc358e7914b83224d9a0fdc9f3d0a4ee773b1ba1f577f5
-
SHA512
7cb2f97823f877fd0763c90a7a49b51293b225447523bb35741107b270ed642ff6113ef0f86892853b0ff6abb98db35b88e25d74476496b9138e341546fd8d40
-
SSDEEP
3072:CBeO0W04qsxKl/1sTmM4PNU+JI4XXFZ4:CBb0W04vxKl90mM4Vhr
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3c49fc1679c89b4a1245c373ce305bab.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_3c49fc1679c89b4a1245c373ce305bab
-
Size
100KB
-
MD5
3c49fc1679c89b4a1245c373ce305bab
-
SHA1
292c48af173dcdd0b13e8f7fb76b55f320b251aa
-
SHA256
28af586e81a623ae6adc358e7914b83224d9a0fdc9f3d0a4ee773b1ba1f577f5
-
SHA512
7cb2f97823f877fd0763c90a7a49b51293b225447523bb35741107b270ed642ff6113ef0f86892853b0ff6abb98db35b88e25d74476496b9138e341546fd8d40
-
SSDEEP
3072:CBeO0W04qsxKl/1sTmM4PNU+JI4XXFZ4:CBb0W04vxKl90mM4Vhr
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5