General
-
Target
JaffaCakes118_a4da8ae6d39377e25152f574ffdf3e80
-
Size
100KB
-
Sample
250205-3f5btsvrft
-
MD5
a4da8ae6d39377e25152f574ffdf3e80
-
SHA1
8c6716722da7343b6808d72399d5129794ffd661
-
SHA256
30b88a311cff4c4e0eee21fbba1ce746694cdae1ab6b106c23a0cc76cf4f0a69
-
SHA512
80b9c40c9302d5d2ec5d7b01d668383ec29e450983c90535d47005950d7ab3a02f3dfa278fae8aa862d16513bc6c3be8ce1d492715a8b53f70ffdebe26a09284
-
SSDEEP
1536:CtCNOlFtnI3zBTbapgrKlecFDX4SlRxGfJTUWsea+LNrvsKCOXxlS0R2tQG:K7tIUpWKleWX40+fNUWseaGrtFjSWC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a4da8ae6d39377e25152f574ffdf3e80.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_a4da8ae6d39377e25152f574ffdf3e80
-
Size
100KB
-
MD5
a4da8ae6d39377e25152f574ffdf3e80
-
SHA1
8c6716722da7343b6808d72399d5129794ffd661
-
SHA256
30b88a311cff4c4e0eee21fbba1ce746694cdae1ab6b106c23a0cc76cf4f0a69
-
SHA512
80b9c40c9302d5d2ec5d7b01d668383ec29e450983c90535d47005950d7ab3a02f3dfa278fae8aa862d16513bc6c3be8ce1d492715a8b53f70ffdebe26a09284
-
SSDEEP
1536:CtCNOlFtnI3zBTbapgrKlecFDX4SlRxGfJTUWsea+LNrvsKCOXxlS0R2tQG:K7tIUpWKleWX40+fNUWseaGrtFjSWC
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5