General
-
Target
JaffaCakes118_77a86c44416e3a176b0d4c29f048b385
-
Size
100KB
-
Sample
250202-b1qwdszjey
-
MD5
77a86c44416e3a176b0d4c29f048b385
-
SHA1
e4dddb377fae58dfbe5ecb92afae0033de25ae21
-
SHA256
52cc67bfce91c3e44aa97a5863511e6ec7a72f4415ac1e5011c4bafe4aa9b2f6
-
SHA512
272215b2ab87b767f38d62febb45459e9531eed4dbe996a970e4ee0b1873f80380717499b4c5a8702d1d6446f042872b6295c581a28242402188b042d4cdc24c
-
SSDEEP
3072:+yBR6PqvWH/kOYwZj7scyMU0RBtNowYHmC1iFbsise:r6PbHxhjrowo71Wbsise
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_77a86c44416e3a176b0d4c29f048b385.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_77a86c44416e3a176b0d4c29f048b385
-
Size
100KB
-
MD5
77a86c44416e3a176b0d4c29f048b385
-
SHA1
e4dddb377fae58dfbe5ecb92afae0033de25ae21
-
SHA256
52cc67bfce91c3e44aa97a5863511e6ec7a72f4415ac1e5011c4bafe4aa9b2f6
-
SHA512
272215b2ab87b767f38d62febb45459e9531eed4dbe996a970e4ee0b1873f80380717499b4c5a8702d1d6446f042872b6295c581a28242402188b042d4cdc24c
-
SSDEEP
3072:+yBR6PqvWH/kOYwZj7scyMU0RBtNowYHmC1iFbsise:r6PbHxhjrowo71Wbsise
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5