General
-
Target
JaffaCakes118_b188bf881b5df1e3d429c5f55a6748cb
-
Size
86KB
-
Sample
250207-b2srdatpct
-
MD5
b188bf881b5df1e3d429c5f55a6748cb
-
SHA1
62b16f67ba27ccf722140e75fad09e0ecf488dcb
-
SHA256
7ec6f0145e78905b84746b8e9070dcf82c687eea19e3ec05a4e2c41e59e8af52
-
SHA512
e7d7e0e0b783f3119866c95c7b5453d41c2271017ad24d98a2ef16fbe5b52458d3d3440aad3a8aff34806155e7864e0ce7194f0137e43022e5f748eb5b6acb48
-
SSDEEP
1536:49x7Za0IAtszWAIJcH2g5G90BDVmIlGadQuC2HLdvE92c:49x7lls4JgvgmC2rwd
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b188bf881b5df1e3d429c5f55a6748cb.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_b188bf881b5df1e3d429c5f55a6748cb
-
Size
86KB
-
MD5
b188bf881b5df1e3d429c5f55a6748cb
-
SHA1
62b16f67ba27ccf722140e75fad09e0ecf488dcb
-
SHA256
7ec6f0145e78905b84746b8e9070dcf82c687eea19e3ec05a4e2c41e59e8af52
-
SHA512
e7d7e0e0b783f3119866c95c7b5453d41c2271017ad24d98a2ef16fbe5b52458d3d3440aad3a8aff34806155e7864e0ce7194f0137e43022e5f748eb5b6acb48
-
SSDEEP
1536:49x7Za0IAtszWAIJcH2g5G90BDVmIlGadQuC2HLdvE92c:49x7lls4JgvgmC2rwd
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5