General
-
Target
JaffaCakes118_a4829250a82d711f60e86ead53e4fb5e
-
Size
384KB
-
Sample
250205-2p79eavkew
-
MD5
a4829250a82d711f60e86ead53e4fb5e
-
SHA1
c8c115ddb6ab6bdf12c76ab836825e0148c45e3f
-
SHA256
23f86aae011af617fa5e6e0f0d6bc601c81e8d4a59fd92975fda44d63abab7d1
-
SHA512
fe4b9343e5f3dc3ac0600fa30b3b1ab5d06969f920358e26c39be398c4392a10609def59378eef9a541ca2725e10edb4de034dd6c1a1fa73e6295ee0e3e57981
-
SSDEEP
12288:KdR/+9IQZ608b5dLsdj8spezwGv3XYjHc+H:Kd8yp08bnkXmP2cS
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a4829250a82d711f60e86ead53e4fb5e.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a4829250a82d711f60e86ead53e4fb5e.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
JaffaCakes118_a4829250a82d711f60e86ead53e4fb5e
-
Size
384KB
-
MD5
a4829250a82d711f60e86ead53e4fb5e
-
SHA1
c8c115ddb6ab6bdf12c76ab836825e0148c45e3f
-
SHA256
23f86aae011af617fa5e6e0f0d6bc601c81e8d4a59fd92975fda44d63abab7d1
-
SHA512
fe4b9343e5f3dc3ac0600fa30b3b1ab5d06969f920358e26c39be398c4392a10609def59378eef9a541ca2725e10edb4de034dd6c1a1fa73e6295ee0e3e57981
-
SSDEEP
12288:KdR/+9IQZ608b5dLsdj8spezwGv3XYjHc+H:Kd8yp08bnkXmP2cS
-
Sality family
-
UAC bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2