General
-
Target
JaffaCakes118_9430cf55bdeb18ec163603403e26c68f
-
Size
100KB
-
Sample
250204-qdft8swrbt
-
MD5
9430cf55bdeb18ec163603403e26c68f
-
SHA1
80172ce24984065b7b6d60d945a49250d6f6a6f1
-
SHA256
9afcdc735a123d390e47b7a733f91c7287e9c2ed4c9137d49b9cda757654d12b
-
SHA512
e2e321c8ca739ce36bce2dbb9c3d6641216fb692efeb9ddcb3e58b218aa2b2678e61dc764ea5ec87a36c9ab410caebe5cacb69bf0359159d130e2f8af0094bc2
-
SSDEEP
3072:M4ZJ1ApXICboSYtNUMVclhPTxkBj0XHVWSd8IABonSC2IPhb:MsJIXHXkOoclN6B4XHrdaBHyPhb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9430cf55bdeb18ec163603403e26c68f.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_9430cf55bdeb18ec163603403e26c68f
-
Size
100KB
-
MD5
9430cf55bdeb18ec163603403e26c68f
-
SHA1
80172ce24984065b7b6d60d945a49250d6f6a6f1
-
SHA256
9afcdc735a123d390e47b7a733f91c7287e9c2ed4c9137d49b9cda757654d12b
-
SHA512
e2e321c8ca739ce36bce2dbb9c3d6641216fb692efeb9ddcb3e58b218aa2b2678e61dc764ea5ec87a36c9ab410caebe5cacb69bf0359159d130e2f8af0094bc2
-
SSDEEP
3072:M4ZJ1ApXICboSYtNUMVclhPTxkBj0XHVWSd8IABonSC2IPhb:MsJIXHXkOoclN6B4XHrdaBHyPhb
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5