General
-
Target
JaffaCakes118_876c42866076bf9f3450332e3dac80f0
-
Size
322KB
-
Sample
250203-mdvfvaznhn
-
MD5
876c42866076bf9f3450332e3dac80f0
-
SHA1
aa39d26fcf7a56971ddbd5779a5cbc4cd91999e0
-
SHA256
24f5ee91e74218a089b2516bcbbdc383f332daf65dfec4ea6e931b972f6b337f
-
SHA512
c4e71dac5125d19054f72052d371776693edfe8203f7b8a0f07fe199cdf1a6fcfa360a9e9fd546f821e5f6bce1ae42d07fe029eb2cfbdbd2ba2a31500c046a1f
-
SSDEEP
6144:YNYMViiff/JSTiTA5UqD107UQrCUN0VtQW0N/5SLUYT:O3RgiTceAhU8tWRILLT
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_876c42866076bf9f3450332e3dac80f0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_876c42866076bf9f3450332e3dac80f0.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_876c42866076bf9f3450332e3dac80f0
-
Size
322KB
-
MD5
876c42866076bf9f3450332e3dac80f0
-
SHA1
aa39d26fcf7a56971ddbd5779a5cbc4cd91999e0
-
SHA256
24f5ee91e74218a089b2516bcbbdc383f332daf65dfec4ea6e931b972f6b337f
-
SHA512
c4e71dac5125d19054f72052d371776693edfe8203f7b8a0f07fe199cdf1a6fcfa360a9e9fd546f821e5f6bce1ae42d07fe029eb2cfbdbd2ba2a31500c046a1f
-
SSDEEP
6144:YNYMViiff/JSTiTA5UqD107UQrCUN0VtQW0N/5SLUYT:O3RgiTceAhU8tWRILLT
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7