General
-
Target
JaffaCakes118_ac45de88389e859b17cc6cb245052139
-
Size
100KB
-
Sample
250206-rxddwszjem
-
MD5
ac45de88389e859b17cc6cb245052139
-
SHA1
5b8e28dc1a7cc7751a5ad20145add0fb2027d257
-
SHA256
9e558161d6186e4987183012dc1b2ebdc3606f416bea437ac76e1b5202bb02f2
-
SHA512
d0cbc206144a3efc9f44676c531b6a80da85a1857cbf1a048a7ff7e1851b2cbe7c6c3bb0bf86a50f724537f7c293d6e994f83ed55fc03c63d06fb59bc1e727a7
-
SSDEEP
3072:5O1qJ+kh+eIMQq5auxasau/xomHgdGr8Jdifzunx0YOzjBT:5O1U1h+eIMn5hou/xBB0Qp
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ac45de88389e859b17cc6cb245052139.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_ac45de88389e859b17cc6cb245052139
-
Size
100KB
-
MD5
ac45de88389e859b17cc6cb245052139
-
SHA1
5b8e28dc1a7cc7751a5ad20145add0fb2027d257
-
SHA256
9e558161d6186e4987183012dc1b2ebdc3606f416bea437ac76e1b5202bb02f2
-
SHA512
d0cbc206144a3efc9f44676c531b6a80da85a1857cbf1a048a7ff7e1851b2cbe7c6c3bb0bf86a50f724537f7c293d6e994f83ed55fc03c63d06fb59bc1e727a7
-
SSDEEP
3072:5O1qJ+kh+eIMQq5auxasau/xomHgdGr8Jdifzunx0YOzjBT:5O1U1h+eIMn5hou/xBB0Qp
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5