General
-
Target
JaffaCakes118_ae85c7fc08d0010351e65e6f9d07f989
-
Size
100KB
-
Sample
250206-xxk2mawkcp
-
MD5
ae85c7fc08d0010351e65e6f9d07f989
-
SHA1
a209c0e32c8f9886ad149c7896a6232ecf1bccef
-
SHA256
27a687210fd76174f5adc615e7ff89247a9ec5fbc510d8721d51d6810ca21679
-
SHA512
e334b04e7b7c2a53f7693f8d8509b3eebdea5cd7a9ac04f5712a2f5e59cd3dffc1398cbc42734f86da9a499f24f500c0450283a281cd79a6afa5407bdbc1a698
-
SSDEEP
3072:PQpSMPOCn0QgWZWa0XZK7qpKc5uQ2GjYdUGx:opqC6qqp55/cdUO
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ae85c7fc08d0010351e65e6f9d07f989.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_ae85c7fc08d0010351e65e6f9d07f989
-
Size
100KB
-
MD5
ae85c7fc08d0010351e65e6f9d07f989
-
SHA1
a209c0e32c8f9886ad149c7896a6232ecf1bccef
-
SHA256
27a687210fd76174f5adc615e7ff89247a9ec5fbc510d8721d51d6810ca21679
-
SHA512
e334b04e7b7c2a53f7693f8d8509b3eebdea5cd7a9ac04f5712a2f5e59cd3dffc1398cbc42734f86da9a499f24f500c0450283a281cd79a6afa5407bdbc1a698
-
SSDEEP
3072:PQpSMPOCn0QgWZWa0XZK7qpKc5uQ2GjYdUGx:opqC6qqp55/cdUO
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5