General
-
Target
JaffaCakes118_54fb181f4163d20fc750ab50f3c1d179
-
Size
6.1MB
-
Sample
250306-e9wd1syrx2
-
MD5
54fb181f4163d20fc750ab50f3c1d179
-
SHA1
16378a93d90ad290266666efa9b23ed44889d01f
-
SHA256
28e2d575f74b76126a9b0497b4a31ba6ac790522f8dee41e58ba85c83ffcb93b
-
SHA512
a431e2000ce3a143a4d4aef5bc8de02fbf9aa1b56e7fdf6dba0e9a443b1ab598494233cb9ee6875cb2f49ce500ecd3beca8342382693837ab26b5480e61bd109
-
SSDEEP
98304:ItDnvUTxCTjG7/cLb7aJnWPxoL9Jz4YZTN8Dd4N7szD/YRXizflXyq:ItDvUcTi7gusW922TNrN7s3/GiFy
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_54fb181f4163d20fc750ab50f3c1d179.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Targets
-
-
Target
JaffaCakes118_54fb181f4163d20fc750ab50f3c1d179
-
Size
6.1MB
-
MD5
54fb181f4163d20fc750ab50f3c1d179
-
SHA1
16378a93d90ad290266666efa9b23ed44889d01f
-
SHA256
28e2d575f74b76126a9b0497b4a31ba6ac790522f8dee41e58ba85c83ffcb93b
-
SHA512
a431e2000ce3a143a4d4aef5bc8de02fbf9aa1b56e7fdf6dba0e9a443b1ab598494233cb9ee6875cb2f49ce500ecd3beca8342382693837ab26b5480e61bd109
-
SSDEEP
98304:ItDnvUTxCTjG7/cLb7aJnWPxoL9Jz4YZTN8Dd4N7szD/YRXizflXyq:ItDvUcTi7gusW922TNrN7s3/GiFy
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Subvert Trust Controls
1SIP and Trust Provider Hijacking
1