General
-
Target
JaffaCakes118_8baaee6191f3b86675e4431f4d7a32dc
-
Size
1.1MB
-
Sample
250203-xnjgfa1qbm
-
MD5
8baaee6191f3b86675e4431f4d7a32dc
-
SHA1
7e836b9d0642b03ceb37ed2d1802ed3dc0a3b74f
-
SHA256
53f084ac3b030f643b913cdb1e0df6129e1a3f8e4a7e492e368512a20c522e60
-
SHA512
cb8ac4427986592209e3851ac613d5fb5cb7460fbc84271f30bc459e8f6a46038882c43f568b4d6d115836f1c525b87f80c43546553d6735e758e6d2ea3f9598
-
SSDEEP
24576:JrJRMGPhe6mVVwRGe6KXvw/CUnu1kWiaz09Ugf3/T/0YS:hJRjPY60wYQXvVUn8PM3bsYS
Behavioral task
behavioral1
Sample
JaffaCakes118_8baaee6191f3b86675e4431f4d7a32dc.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_8baaee6191f3b86675e4431f4d7a32dc
-
Size
1.1MB
-
MD5
8baaee6191f3b86675e4431f4d7a32dc
-
SHA1
7e836b9d0642b03ceb37ed2d1802ed3dc0a3b74f
-
SHA256
53f084ac3b030f643b913cdb1e0df6129e1a3f8e4a7e492e368512a20c522e60
-
SHA512
cb8ac4427986592209e3851ac613d5fb5cb7460fbc84271f30bc459e8f6a46038882c43f568b4d6d115836f1c525b87f80c43546553d6735e758e6d2ea3f9598
-
SSDEEP
24576:JrJRMGPhe6mVVwRGe6KXvw/CUnu1kWiaz09Ugf3/T/0YS:hJRjPY60wYQXvVUn8PM3bsYS
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5