General
-
Target
JaffaCakes118_62f6eca59dce38185a4cc5490611c0b3
-
Size
96KB
-
Sample
250130-p69gkstmem
-
MD5
62f6eca59dce38185a4cc5490611c0b3
-
SHA1
a6802fbc248c3ffd7fa3d2539dfca0e232159aee
-
SHA256
2fde3af42e9fb8f9b2dd341ba06557518a071f71f90cfa768451ed01ad36974d
-
SHA512
4c6f20c9528556095d1f6de9f89292a6cac29f122b451ac01b7aae62a50c68af0eb504891963c65c1b2d749b6e7aa475cc2d7b909fd54b4854a4db8dad1e08ae
-
SSDEEP
3072:B2VvHYQ+6WKpM2yOMlkkdjr8hmbq9bxCa1dLDwTFq:Et4GwBjept7w4
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_62f6eca59dce38185a4cc5490611c0b3.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_62f6eca59dce38185a4cc5490611c0b3
-
Size
96KB
-
MD5
62f6eca59dce38185a4cc5490611c0b3
-
SHA1
a6802fbc248c3ffd7fa3d2539dfca0e232159aee
-
SHA256
2fde3af42e9fb8f9b2dd341ba06557518a071f71f90cfa768451ed01ad36974d
-
SHA512
4c6f20c9528556095d1f6de9f89292a6cac29f122b451ac01b7aae62a50c68af0eb504891963c65c1b2d749b6e7aa475cc2d7b909fd54b4854a4db8dad1e08ae
-
SSDEEP
3072:B2VvHYQ+6WKpM2yOMlkkdjr8hmbq9bxCa1dLDwTFq:Et4GwBjept7w4
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5