General
-
Target
JaffaCakes118_b3b507092221e6d4ab262bb850a12c85
-
Size
100KB
-
Sample
250207-gk1njs1mcx
-
MD5
b3b507092221e6d4ab262bb850a12c85
-
SHA1
a25631c8500138865cb0f6ccdbb1e6dcbb888bda
-
SHA256
5ce139524c79364e7bf0a67d976d46664d9466ebf9685263de46a32a65885317
-
SHA512
c56a4da13c1d9ef3ca05afc0917573638121b08bc041b10b1ec6e32c1d7992a11223707899a0ffa9ef62123270a88453ae4dfbcf1b9dae7819842e7afea98508
-
SSDEEP
3072:amSTA406oXOPc4j72fTLGnlIbGzd5Z2bftU0e:a24voOPVjSrL6lIbGx5MzO0e
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b3b507092221e6d4ab262bb850a12c85.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_b3b507092221e6d4ab262bb850a12c85
-
Size
100KB
-
MD5
b3b507092221e6d4ab262bb850a12c85
-
SHA1
a25631c8500138865cb0f6ccdbb1e6dcbb888bda
-
SHA256
5ce139524c79364e7bf0a67d976d46664d9466ebf9685263de46a32a65885317
-
SHA512
c56a4da13c1d9ef3ca05afc0917573638121b08bc041b10b1ec6e32c1d7992a11223707899a0ffa9ef62123270a88453ae4dfbcf1b9dae7819842e7afea98508
-
SSDEEP
3072:amSTA406oXOPc4j72fTLGnlIbGzd5Z2bftU0e:a24voOPVjSrL6lIbGx5MzO0e
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5