General
-
Target
JaffaCakes118_542520a6660afe01ee3110f5e9a82703
-
Size
97KB
-
Sample
250305-31shrssxcy
-
MD5
542520a6660afe01ee3110f5e9a82703
-
SHA1
58860c7054c7686c513c90f0d9116ed5706ae7da
-
SHA256
f098df30e31208526bb7c6bf90d9fc91087ac7b1545b44563bfc76e4ad246592
-
SHA512
da89a8333d92a1fc42a2cd86bc2cf550276479223c5c9dd515429bbf1a4fead128ce89ce559e85bfb87b97310dcd3ff6210fd12f8541117cc630ec522b318087
-
SSDEEP
3072:/1s1zVXbw1QOSBaBUqYDyFI4VHbZ8Qhj1:/1L1RBoDmIw7H
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_542520a6660afe01ee3110f5e9a82703.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
JaffaCakes118_542520a6660afe01ee3110f5e9a82703
-
Size
97KB
-
MD5
542520a6660afe01ee3110f5e9a82703
-
SHA1
58860c7054c7686c513c90f0d9116ed5706ae7da
-
SHA256
f098df30e31208526bb7c6bf90d9fc91087ac7b1545b44563bfc76e4ad246592
-
SHA512
da89a8333d92a1fc42a2cd86bc2cf550276479223c5c9dd515429bbf1a4fead128ce89ce559e85bfb87b97310dcd3ff6210fd12f8541117cc630ec522b318087
-
SSDEEP
3072:/1s1zVXbw1QOSBaBUqYDyFI4VHbZ8Qhj1:/1L1RBoDmIw7H
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5