General
-
Target
JaffaCakes118_631e397d46142e25855b1bc4db368750
-
Size
100KB
-
Sample
250130-qh8qtatqdk
-
MD5
631e397d46142e25855b1bc4db368750
-
SHA1
78a0e7935c1df44d8864a534323a14eab747bf03
-
SHA256
5c4f73ff4be5b4bfc87bd73896c540dd2c55ccc309fb584a8ceaa2e430292201
-
SHA512
f7629a5122abd1d08aa73638e4586fad597bae48bce6abebaf1eb2597774d00a8d195fa48696522f3b65f861be277b1588ee210d5e7db631054ed36a028b24ba
-
SSDEEP
3072:IVIFvTSd2Z7ZeJFqq4BxwGkP7oqwcFRK3SzaXtaY:Aw7w07ZcWBSFzoqwcxmt/
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_631e397d46142e25855b1bc4db368750.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_631e397d46142e25855b1bc4db368750
-
Size
100KB
-
MD5
631e397d46142e25855b1bc4db368750
-
SHA1
78a0e7935c1df44d8864a534323a14eab747bf03
-
SHA256
5c4f73ff4be5b4bfc87bd73896c540dd2c55ccc309fb584a8ceaa2e430292201
-
SHA512
f7629a5122abd1d08aa73638e4586fad597bae48bce6abebaf1eb2597774d00a8d195fa48696522f3b65f861be277b1588ee210d5e7db631054ed36a028b24ba
-
SSDEEP
3072:IVIFvTSd2Z7ZeJFqq4BxwGkP7oqwcFRK3SzaXtaY:Aw7w07ZcWBSFzoqwcxmt/
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5