General
-
Target
JaffaCakes118_6175f1f2a194f1a5a20099720ac30d5d
-
Size
100KB
-
Sample
250130-lwvznaxpgw
-
MD5
6175f1f2a194f1a5a20099720ac30d5d
-
SHA1
587a32f8018287c4ab2e92675ae16cb8a24a76f1
-
SHA256
12bba0433f87cd765242a0a19072df4c78b5f81edbc1d3f715bee5cd698b4ae4
-
SHA512
af60ab7b3a09d946c3cb96eccd7b4692fae15d074308e678eea105ce1ee111c90e6e690116a990a50bd44a6db07e7041aacbcbd312e96e6119d3550a4597dc5c
-
SSDEEP
3072:NpqbXDHGgMSeCwVIHa2MqNKjiNn3NNB7W:vqfQSeCwV+MqNKjiNn3XV
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6175f1f2a194f1a5a20099720ac30d5d.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_6175f1f2a194f1a5a20099720ac30d5d
-
Size
100KB
-
MD5
6175f1f2a194f1a5a20099720ac30d5d
-
SHA1
587a32f8018287c4ab2e92675ae16cb8a24a76f1
-
SHA256
12bba0433f87cd765242a0a19072df4c78b5f81edbc1d3f715bee5cd698b4ae4
-
SHA512
af60ab7b3a09d946c3cb96eccd7b4692fae15d074308e678eea105ce1ee111c90e6e690116a990a50bd44a6db07e7041aacbcbd312e96e6119d3550a4597dc5c
-
SSDEEP
3072:NpqbXDHGgMSeCwVIHa2MqNKjiNn3NNB7W:vqfQSeCwV+MqNKjiNn3XV
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5