General
-
Target
JaffaCakes118_765e13c786a5dfb34dd9d6a2b881729e
-
Size
100KB
-
Sample
250201-2kgkwstlaz
-
MD5
765e13c786a5dfb34dd9d6a2b881729e
-
SHA1
b725f03581f3e2f69bbd528a792ba3798769934e
-
SHA256
53cbf8aa914f1f62bb4505359586a93c0095de19b2411bed0e42fcfa2c3974e4
-
SHA512
97e5faf0a76ef56e7b0db7cf070154a8a1fa8d5bd5f3c56f4be024461a92a2a474586bf97e834907888239e538091092718f4a9dfe7d6f5acaee69985678a557
-
SSDEEP
1536:L5X7EaKLGivOevk51N1IQ4pCv3v9RSnvcfBCICYGqcgPpYXlZ:1X7EaiGimfUgYvcfQdfyPpYX
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_765e13c786a5dfb34dd9d6a2b881729e.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_765e13c786a5dfb34dd9d6a2b881729e
-
Size
100KB
-
MD5
765e13c786a5dfb34dd9d6a2b881729e
-
SHA1
b725f03581f3e2f69bbd528a792ba3798769934e
-
SHA256
53cbf8aa914f1f62bb4505359586a93c0095de19b2411bed0e42fcfa2c3974e4
-
SHA512
97e5faf0a76ef56e7b0db7cf070154a8a1fa8d5bd5f3c56f4be024461a92a2a474586bf97e834907888239e538091092718f4a9dfe7d6f5acaee69985678a557
-
SSDEEP
1536:L5X7EaKLGivOevk51N1IQ4pCv3v9RSnvcfBCICYGqcgPpYXlZ:1X7EaiGimfUgYvcfQdfyPpYX
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5