General
-
Target
JaffaCakes118_928e481b07ce96d000fc71b8145ccc15
-
Size
284KB
-
Sample
250204-lxqrbssqgy
-
MD5
928e481b07ce96d000fc71b8145ccc15
-
SHA1
ee5c4995e1f5d258315d1562d148b7ae0b4acfce
-
SHA256
3e93e8a1d439cc1186310fdc8751822937012aa0d5f6556335d0d54e66c23a46
-
SHA512
84268ba72982e50fc3ed2a99376b3d5424486e2e1903067985337fe2ff8a072830315541377215be40619c997166471152ac997eb3261d73468a38f10e9ed216
-
SSDEEP
6144:GZC4d3lbxc6wU/UP+XhdMRFD3LAwekt5oSAjsNEkRLNsoAUk0:v4dMRU/UP4heFjLDFt5oS9R2Tr0
Behavioral task
behavioral1
Sample
JaffaCakes118_928e481b07ce96d000fc71b8145ccc15.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_928e481b07ce96d000fc71b8145ccc15
-
Size
284KB
-
MD5
928e481b07ce96d000fc71b8145ccc15
-
SHA1
ee5c4995e1f5d258315d1562d148b7ae0b4acfce
-
SHA256
3e93e8a1d439cc1186310fdc8751822937012aa0d5f6556335d0d54e66c23a46
-
SHA512
84268ba72982e50fc3ed2a99376b3d5424486e2e1903067985337fe2ff8a072830315541377215be40619c997166471152ac997eb3261d73468a38f10e9ed216
-
SSDEEP
6144:GZC4d3lbxc6wU/UP+XhdMRFD3LAwekt5oSAjsNEkRLNsoAUk0:v4dMRU/UP4heFjLDFt5oS9R2Tr0
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5