General
-
Target
JaffaCakes118_7838371379f5ca8b9e02ebf336b795b1
-
Size
97KB
-
Sample
250202-db677atneq
-
MD5
7838371379f5ca8b9e02ebf336b795b1
-
SHA1
06892e346aface94c52249db17e71d499775bd15
-
SHA256
25ebc49cd6917c5cdece852acfc9e2fe0342f395d7804fc4225662036299e3b7
-
SHA512
7d2e5f18393a1d29e8bdcac9521d3760372ec435a0537ce72b8b8169af9a98768404508801e96726e4b09481ca3324af6687bc4af6eed0afc6fb3836faa8d8d5
-
SSDEEP
3072:+GIuZOlqvCs6Zp9q33HQWGF8secIQtOrZ:+GISOIv36Zi331LQt
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7838371379f5ca8b9e02ebf336b795b1.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
JaffaCakes118_7838371379f5ca8b9e02ebf336b795b1
-
Size
97KB
-
MD5
7838371379f5ca8b9e02ebf336b795b1
-
SHA1
06892e346aface94c52249db17e71d499775bd15
-
SHA256
25ebc49cd6917c5cdece852acfc9e2fe0342f395d7804fc4225662036299e3b7
-
SHA512
7d2e5f18393a1d29e8bdcac9521d3760372ec435a0537ce72b8b8169af9a98768404508801e96726e4b09481ca3324af6687bc4af6eed0afc6fb3836faa8d8d5
-
SSDEEP
3072:+GIuZOlqvCs6Zp9q33HQWGF8secIQtOrZ:+GISOIv36Zi331LQt
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5