General
-
Target
JaffaCakes118_bac339fdee79f14b7951c619cf65d4b9
-
Size
100KB
-
Sample
250207-yfl32avkdy
-
MD5
bac339fdee79f14b7951c619cf65d4b9
-
SHA1
d9fa0bc9eef7436ee3e70ad19de93fa8502bdaaa
-
SHA256
07dbf08f7654321500037108d0f8fa076021477bf98c94a2c40fc9b5a25da7c9
-
SHA512
8ec7fca3fe3ad1652e03ab127ac9aacc5a998364d54708370f23ecc391f737e71bcb0c82712739d455f672d1ecc5da7008dfd208e280dfa616187338ccfad18e
-
SSDEEP
3072:ApnTwvp8m+tlhntk65MoY8zKZ7Igw1mYruL:Apcv+ztZk6So1uBI1m9
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_bac339fdee79f14b7951c619cf65d4b9.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_bac339fdee79f14b7951c619cf65d4b9
-
Size
100KB
-
MD5
bac339fdee79f14b7951c619cf65d4b9
-
SHA1
d9fa0bc9eef7436ee3e70ad19de93fa8502bdaaa
-
SHA256
07dbf08f7654321500037108d0f8fa076021477bf98c94a2c40fc9b5a25da7c9
-
SHA512
8ec7fca3fe3ad1652e03ab127ac9aacc5a998364d54708370f23ecc391f737e71bcb0c82712739d455f672d1ecc5da7008dfd208e280dfa616187338ccfad18e
-
SSDEEP
3072:ApnTwvp8m+tlhntk65MoY8zKZ7Igw1mYruL:Apcv+ztZk6So1uBI1m9
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Downloads MZ/PE file
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5