General
-
Target
JaffaCakes118_91f1fb614fdc073485369fcc048cd035
-
Size
229KB
-
Sample
250204-kk8kya1paw
-
MD5
91f1fb614fdc073485369fcc048cd035
-
SHA1
81fe830506722ee2403a9404b4598e79801360a8
-
SHA256
af111f0259fb25f5fb02805318544d01cc598f4e81a014d5aaba1a0cd747c330
-
SHA512
e02527253c7d5331396ca7e6c992b271148b36add026deacff0fbd560da3652a8405e388fd4d06c1bf06010177aea630ee0a33d7206c835883187922e529710b
-
SSDEEP
6144:Op/3xAz12ytsbRHVsZ8VPYNt5CD1uD5RZ+f/V:Op/incS+ICcDNSt
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_91f1fb614fdc073485369fcc048cd035.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_91f1fb614fdc073485369fcc048cd035
-
Size
229KB
-
MD5
91f1fb614fdc073485369fcc048cd035
-
SHA1
81fe830506722ee2403a9404b4598e79801360a8
-
SHA256
af111f0259fb25f5fb02805318544d01cc598f4e81a014d5aaba1a0cd747c330
-
SHA512
e02527253c7d5331396ca7e6c992b271148b36add026deacff0fbd560da3652a8405e388fd4d06c1bf06010177aea630ee0a33d7206c835883187922e529710b
-
SSDEEP
6144:Op/3xAz12ytsbRHVsZ8VPYNt5CD1uD5RZ+f/V:Op/incS+ICcDNSt
-
Modifies firewall policy service
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7