General
-
Target
JaffaCakes118_a4bbf34c4ac990ef2b1e2ac107d31480
-
Size
100KB
-
Sample
250205-286vpaxncl
-
MD5
a4bbf34c4ac990ef2b1e2ac107d31480
-
SHA1
d4db43a78637bda5987d71490d0d02e5b0a200f3
-
SHA256
12e839e64438a17bedb4341b7848e66cb7e2d3e8584a8aa29f12e83078c330e2
-
SHA512
5449c81088aafae9211a3683077dbbe9fc9458f89106f1f062dee3efb650b75793f25b90fd94a17f61bd22519ddcb31c3f8a164db50ff85062563535db4b9a00
-
SSDEEP
3072:4gXxZkidM4b9B9Z6+zWdHeWUSaiaSIcWRU:zB+iddb9TZ6WSIc9
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a4bbf34c4ac990ef2b1e2ac107d31480.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_a4bbf34c4ac990ef2b1e2ac107d31480
-
Size
100KB
-
MD5
a4bbf34c4ac990ef2b1e2ac107d31480
-
SHA1
d4db43a78637bda5987d71490d0d02e5b0a200f3
-
SHA256
12e839e64438a17bedb4341b7848e66cb7e2d3e8584a8aa29f12e83078c330e2
-
SHA512
5449c81088aafae9211a3683077dbbe9fc9458f89106f1f062dee3efb650b75793f25b90fd94a17f61bd22519ddcb31c3f8a164db50ff85062563535db4b9a00
-
SSDEEP
3072:4gXxZkidM4b9B9Z6+zWdHeWUSaiaSIcWRU:zB+iddb9TZ6WSIc9
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5