General
-
Target
JaffaCakes118_8f79ac093d8f7513c1d59371611846a5
-
Size
936KB
-
Sample
250204-d5vq9avpfm
-
MD5
8f79ac093d8f7513c1d59371611846a5
-
SHA1
d70d20ff6a0882c7dcf47f0b8b184d93034a0369
-
SHA256
35a7abd9a0b640efe2dc58fd01343b64de88084d33b7af2a8eac77cbca768d7d
-
SHA512
ae0c4a1cbe988199babe41ba0aec91361511b4ce48203792a40b6869d70db40309c3b1162bd5c093c2c51cb9821848b0e87df5cbaf4206100ab0a9299930668f
-
SSDEEP
24576:cnaC78RwoyaKSkqbSwCtA69iDtAbJnCjjiOZY9bL:Ga1woftWw2tiDtGMLa
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8f79ac093d8f7513c1d59371611846a5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8f79ac093d8f7513c1d59371611846a5.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_8f79ac093d8f7513c1d59371611846a5
-
Size
936KB
-
MD5
8f79ac093d8f7513c1d59371611846a5
-
SHA1
d70d20ff6a0882c7dcf47f0b8b184d93034a0369
-
SHA256
35a7abd9a0b640efe2dc58fd01343b64de88084d33b7af2a8eac77cbca768d7d
-
SHA512
ae0c4a1cbe988199babe41ba0aec91361511b4ce48203792a40b6869d70db40309c3b1162bd5c093c2c51cb9821848b0e87df5cbaf4206100ab0a9299930668f
-
SSDEEP
24576:cnaC78RwoyaKSkqbSwCtA69iDtAbJnCjjiOZY9bL:Ga1woftWw2tiDtGMLa
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6