General
-
Target
JaffaCakes118_89121b042023e6cbf67f56e4e1e7e78f
-
Size
100KB
-
Sample
250203-qwsazstrep
-
MD5
89121b042023e6cbf67f56e4e1e7e78f
-
SHA1
63a5142ab4f661a002933dcffd1f87cb50686dfc
-
SHA256
9a091b961929ca1585e826bcfc4d36beb0283201d68b4d7c9f7b3b82262324ad
-
SHA512
0743c0368d0313941287b053dba21aff05f0026f0cf53542fed11ef7dad4af6a9f40a343a0fcb4f4a61fff024c6ec11429b1327063e5ff43dc83bc14bc18c8da
-
SSDEEP
3072:jpz7UhUWxNMxj0Faf2ZyY4ifuzqVEdE4:tzKU4NMe22LumVcb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_89121b042023e6cbf67f56e4e1e7e78f.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_89121b042023e6cbf67f56e4e1e7e78f
-
Size
100KB
-
MD5
89121b042023e6cbf67f56e4e1e7e78f
-
SHA1
63a5142ab4f661a002933dcffd1f87cb50686dfc
-
SHA256
9a091b961929ca1585e826bcfc4d36beb0283201d68b4d7c9f7b3b82262324ad
-
SHA512
0743c0368d0313941287b053dba21aff05f0026f0cf53542fed11ef7dad4af6a9f40a343a0fcb4f4a61fff024c6ec11429b1327063e5ff43dc83bc14bc18c8da
-
SSDEEP
3072:jpz7UhUWxNMxj0Faf2ZyY4ifuzqVEdE4:tzKU4NMe22LumVcb
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5