General
-
Target
JaffaCakes118_7f92a093440689b8a01f403efd4aaf78
-
Size
216KB
-
Sample
250202-w2lchstmhx
-
MD5
7f92a093440689b8a01f403efd4aaf78
-
SHA1
7909504f336e8486ecbd0669b7ef20fedb7a55cc
-
SHA256
e032db5625dfbb1c91ce3ca8d10d735a188ee318ef60efe2c327c5022ae47000
-
SHA512
ec08c91e0bab1da36a428c2cf090cdb5f95173800fb3af49045b5c36bbb2586649ccd59f700e42395f5aca5253e510b944ec98d02c8fa7a30ccc6e791ff339a8
-
SSDEEP
3072:nH5HBNucz9/tBH3H3+qkxdXNVHs8xtI3UER2:HNucz5TH3H3Sd9ts8od8
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7f92a093440689b8a01f403efd4aaf78.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7f92a093440689b8a01f403efd4aaf78.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_7f92a093440689b8a01f403efd4aaf78
-
Size
216KB
-
MD5
7f92a093440689b8a01f403efd4aaf78
-
SHA1
7909504f336e8486ecbd0669b7ef20fedb7a55cc
-
SHA256
e032db5625dfbb1c91ce3ca8d10d735a188ee318ef60efe2c327c5022ae47000
-
SHA512
ec08c91e0bab1da36a428c2cf090cdb5f95173800fb3af49045b5c36bbb2586649ccd59f700e42395f5aca5253e510b944ec98d02c8fa7a30ccc6e791ff339a8
-
SSDEEP
3072:nH5HBNucz9/tBH3H3+qkxdXNVHs8xtI3UER2:HNucz5TH3H3Sd9ts8od8
-
Modifies firewall policy service
-
Modifies visiblity of hidden/system files in Explorer
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7