General
-
Target
JaffaCakes118_7362605bc799177f1d657b615bea025c
-
Size
1.4MB
-
Sample
250201-s9n7la1kgr
-
MD5
7362605bc799177f1d657b615bea025c
-
SHA1
edd4cd64df3805157c4f90845a0d7b5b387d1ca8
-
SHA256
3f06797da52569d424cb5794e67872f154a56cfee90e538d41931e45adbbfa1e
-
SHA512
a9a795bc20f6e3a6cc8403929ab1fad263f37f2ecfcb50c2ee0d9f7e802d1cf0c50b225eb3978455a7891350fb25d7a64d6ce2394e57ef133f67b9b3bf0071a4
-
SSDEEP
24576:Fze5J4Ay7hXkzj36FfHQMTze5J4Ay7hXkzj36FfHQMa4Ky:gIezW1CIezW1Ky
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7362605bc799177f1d657b615bea025c.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_7362605bc799177f1d657b615bea025c
-
Size
1.4MB
-
MD5
7362605bc799177f1d657b615bea025c
-
SHA1
edd4cd64df3805157c4f90845a0d7b5b387d1ca8
-
SHA256
3f06797da52569d424cb5794e67872f154a56cfee90e538d41931e45adbbfa1e
-
SHA512
a9a795bc20f6e3a6cc8403929ab1fad263f37f2ecfcb50c2ee0d9f7e802d1cf0c50b225eb3978455a7891350fb25d7a64d6ce2394e57ef133f67b9b3bf0071a4
-
SSDEEP
24576:Fze5J4Ay7hXkzj36FfHQMTze5J4Ay7hXkzj36FfHQMa4Ky:gIezW1CIezW1Ky
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5