General
-
Target
JaffaCakes118_48750158c081745d04dc11be9b24da91
-
Size
120KB
-
Sample
250128-jhlgyssjev
-
MD5
48750158c081745d04dc11be9b24da91
-
SHA1
9ee4dd4dc47dd8dc23c619e702e4ff584f44832a
-
SHA256
15bfb23d6abf8679b20cc78677583456efce11bb3eecedca6c1ffa8fc6f0276c
-
SHA512
c602d417d75fbef8e61e1553fcb71814b90684090ee0dc7318951234cde3f7181afc1892f625a7cefdf127aca57f88896d39e96f44fc38c3c68ed133c31e14be
-
SSDEEP
3072:jHvuBnjhTmFy3bEQLResSUbnXhI86aj3XA3Tha:buBlDIQLRe+bRI86X3Tha
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_48750158c081745d04dc11be9b24da91.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
JaffaCakes118_48750158c081745d04dc11be9b24da91
-
Size
120KB
-
MD5
48750158c081745d04dc11be9b24da91
-
SHA1
9ee4dd4dc47dd8dc23c619e702e4ff584f44832a
-
SHA256
15bfb23d6abf8679b20cc78677583456efce11bb3eecedca6c1ffa8fc6f0276c
-
SHA512
c602d417d75fbef8e61e1553fcb71814b90684090ee0dc7318951234cde3f7181afc1892f625a7cefdf127aca57f88896d39e96f44fc38c3c68ed133c31e14be
-
SSDEEP
3072:jHvuBnjhTmFy3bEQLResSUbnXhI86aj3XA3Tha:buBlDIQLRe+bRI86X3Tha
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5