General
-
Target
JaffaCakes118_5c1ef6eb11f2fe7a2828e5e8b20f4bcb
-
Size
100KB
-
Sample
250129-2stkes1rg1
-
MD5
5c1ef6eb11f2fe7a2828e5e8b20f4bcb
-
SHA1
26dcce82e5297dd60f1d897d7c25368c841f86e2
-
SHA256
3f88b0a85379bdc3f26c981ac0b26789d311b4c90c93f71640f0b014b5cbbe94
-
SHA512
f7bfd0b0ad5dfc5a26df5812c4d48bcd7610d6460682083f0de132d534bf9584fca602510a847c6d36804da260b67e23b470429e84c6f4a3fafbcb53a3de8b60
-
SSDEEP
1536:MSbdhXK9ZPofmTRtfUTCNzWdHtD2EImaM+OoNmP2Lu4rogd8pC1yp:1RZiZ9vUTuWdfIB8MsskC1y
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5c1ef6eb11f2fe7a2828e5e8b20f4bcb.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_5c1ef6eb11f2fe7a2828e5e8b20f4bcb
-
Size
100KB
-
MD5
5c1ef6eb11f2fe7a2828e5e8b20f4bcb
-
SHA1
26dcce82e5297dd60f1d897d7c25368c841f86e2
-
SHA256
3f88b0a85379bdc3f26c981ac0b26789d311b4c90c93f71640f0b014b5cbbe94
-
SHA512
f7bfd0b0ad5dfc5a26df5812c4d48bcd7610d6460682083f0de132d534bf9584fca602510a847c6d36804da260b67e23b470429e84c6f4a3fafbcb53a3de8b60
-
SSDEEP
1536:MSbdhXK9ZPofmTRtfUTCNzWdHtD2EImaM+OoNmP2Lu4rogd8pC1yp:1RZiZ9vUTuWdfIB8MsskC1y
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5