General
-
Target
JaffaCakes118_56d8c7c80f9cce10e8e2a9ac5ad1ca3b
-
Size
760KB
-
Sample
250129-pnlykawldp
-
MD5
56d8c7c80f9cce10e8e2a9ac5ad1ca3b
-
SHA1
4d3618cdbe83d7b6190800256a0af6dcfa75022d
-
SHA256
20dcf9b3853877bb7939e4e8ff760cdc13024168ddfa33f9d8ed06b4fc74981f
-
SHA512
1eb5a6e0a41e16180db25a25bc549853ffa214eecde207e3fc0592fb61825b2ba8af1dc359bf2933485f2776dd404ff8851ded18692fce785c6b151d60415a43
-
SSDEEP
12288:l0QfKb7nH5lrPo37AzHTA63I0ihE4UEQrrNtIECORGv35ELkfXExy89mNmvZ+:lfKbT5lrPo37AzHTA63/cfU9IEU35TfH
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_56d8c7c80f9cce10e8e2a9ac5ad1ca3b.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_56d8c7c80f9cce10e8e2a9ac5ad1ca3b
-
Size
760KB
-
MD5
56d8c7c80f9cce10e8e2a9ac5ad1ca3b
-
SHA1
4d3618cdbe83d7b6190800256a0af6dcfa75022d
-
SHA256
20dcf9b3853877bb7939e4e8ff760cdc13024168ddfa33f9d8ed06b4fc74981f
-
SHA512
1eb5a6e0a41e16180db25a25bc549853ffa214eecde207e3fc0592fb61825b2ba8af1dc359bf2933485f2776dd404ff8851ded18692fce785c6b151d60415a43
-
SSDEEP
12288:l0QfKb7nH5lrPo37AzHTA63I0ihE4UEQrrNtIECORGv35ELkfXExy89mNmvZ+:lfKbT5lrPo37AzHTA63/cfU9IEU35TfH
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5