General
-
Target
JaffaCakes118_53cc963de54a127b9f22a07e20e1cb49
-
Size
27.4MB
-
Sample
250305-1zvkmazydx
-
MD5
53cc963de54a127b9f22a07e20e1cb49
-
SHA1
bced5993dc159cd730490dbdf4c0cff2b7c35e4c
-
SHA256
78d40664021ec78562c6fdd49d7e50c56762f3057985fe3103970899f9b4056b
-
SHA512
44fd2399e3ff8890326bf2424e731973c970c381c794a58d3c7e5582691fba498e2f0ba51f4e5185f270116eec47ddfe4554d803012eeaaa6eeeabef4f11875e
-
SSDEEP
786432:JR8js7fBTjyUL12StRbOhYdkzDi9zk5EWloT+CCB:Jf7VnL11tEhSX9gHl
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_53cc963de54a127b9f22a07e20e1cb49.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_53cc963de54a127b9f22a07e20e1cb49
-
Size
27.4MB
-
MD5
53cc963de54a127b9f22a07e20e1cb49
-
SHA1
bced5993dc159cd730490dbdf4c0cff2b7c35e4c
-
SHA256
78d40664021ec78562c6fdd49d7e50c56762f3057985fe3103970899f9b4056b
-
SHA512
44fd2399e3ff8890326bf2424e731973c970c381c794a58d3c7e5582691fba498e2f0ba51f4e5185f270116eec47ddfe4554d803012eeaaa6eeeabef4f11875e
-
SSDEEP
786432:JR8js7fBTjyUL12StRbOhYdkzDi9zk5EWloT+CCB:Jf7VnL11tEhSX9gHl
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5