General
-
Target
JaffaCakes118_89c908411fa7e23f05ed9d7126d9522a
-
Size
120KB
-
Sample
250203-se7epawmel
-
MD5
89c908411fa7e23f05ed9d7126d9522a
-
SHA1
4abaea01714c6a2e48943073de57ac9b19fa167c
-
SHA256
6ae9e4b58b4e76551b2efb441685cc0b2a10585f4aaadc31e09d515ab486a2f4
-
SHA512
4362619274683b527661450f89fdd0b05b6b76d834e25250af5875b56b553ddb6cbd403eeffb17f8feb044eb098db8a9efc059cfd5e4aa52e345a0c76a71e059
-
SSDEEP
1536:J3LdehngyGLiJhnY7b0RW6taWDlE1GRtebiuJi3nLNtGANvxyAQCihkhCGqrrAzz:SBBtIkW6JlE1GRtVYwLGixvAJnA
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_89c908411fa7e23f05ed9d7126d9522a.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
JaffaCakes118_89c908411fa7e23f05ed9d7126d9522a
-
Size
120KB
-
MD5
89c908411fa7e23f05ed9d7126d9522a
-
SHA1
4abaea01714c6a2e48943073de57ac9b19fa167c
-
SHA256
6ae9e4b58b4e76551b2efb441685cc0b2a10585f4aaadc31e09d515ab486a2f4
-
SHA512
4362619274683b527661450f89fdd0b05b6b76d834e25250af5875b56b553ddb6cbd403eeffb17f8feb044eb098db8a9efc059cfd5e4aa52e345a0c76a71e059
-
SSDEEP
1536:J3LdehngyGLiJhnY7b0RW6taWDlE1GRtebiuJi3nLNtGANvxyAQCihkhCGqrrAzz:SBBtIkW6JlE1GRtVYwLGixvAJnA
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5