General
-
Target
JaffaCakes118_689ef0f2e6af8ad3d32ab57e1b21a5ee
-
Size
1.4MB
-
Sample
250131-kwsc4atkfq
-
MD5
689ef0f2e6af8ad3d32ab57e1b21a5ee
-
SHA1
3dd4725886252418e31e12ab069e73b12d6503b3
-
SHA256
52a7d48f7b130539b1f1c97736170ced7b48fe38473656a7d32405a9ca20a586
-
SHA512
c0695108cc48873f59aa149328320324f0d3ac208910465a57ef177173a0d6fc73cf62b0ebdc8f51c355134f09d7445328412d22ee6bb8c1490ad641bdd6bba2
-
SSDEEP
24576:2QuC55ocNjUen9Orr/dJN8DIo6YqJWVzlF2jXAo9ImxkSe8dZYZn3a9J4Ws/HIvZ:2zC5KcNjUg9ijN8Dv6TJWxlskfm7e8dn
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_689ef0f2e6af8ad3d32ab57e1b21a5ee.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_689ef0f2e6af8ad3d32ab57e1b21a5ee.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
JaffaCakes118_689ef0f2e6af8ad3d32ab57e1b21a5ee
-
Size
1.4MB
-
MD5
689ef0f2e6af8ad3d32ab57e1b21a5ee
-
SHA1
3dd4725886252418e31e12ab069e73b12d6503b3
-
SHA256
52a7d48f7b130539b1f1c97736170ced7b48fe38473656a7d32405a9ca20a586
-
SHA512
c0695108cc48873f59aa149328320324f0d3ac208910465a57ef177173a0d6fc73cf62b0ebdc8f51c355134f09d7445328412d22ee6bb8c1490ad641bdd6bba2
-
SSDEEP
24576:2QuC55ocNjUen9Orr/dJN8DIo6YqJWVzlF2jXAo9ImxkSe8dZYZn3a9J4Ws/HIvZ:2zC5KcNjUg9ijN8Dv6TJWxlskfm7e8dn
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
4Pre-OS Boot
1Bootkit
1