General
-
Target
JaffaCakes118_97d984436c700d6b5e8a62ccdedd13a6
-
Size
120KB
-
Sample
250329-y5xaasvkt5
-
MD5
97d984436c700d6b5e8a62ccdedd13a6
-
SHA1
02ee7709b022be94aad13fafd3ca415e6139b136
-
SHA256
452371c81ad4672ce0acf32c4757305d2962488906f169bc22e43791c141d757
-
SHA512
f525ffbeec9da4206a0633b9b4671c5a9c71f206d32b81a95c0244f5e2c83cf21cf81be37b98998a829ef4469999929cc2750692043615c758bd0458546d3810
-
SSDEEP
1536:B2hk0TzyMLxL/Pmu2WrHCqu/FDjCB9/FdBg+zaWv9aqAIw0wF:B2RTzzv3TCqu/FnCB9T6+zaW195rw
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_97d984436c700d6b5e8a62ccdedd13a6.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
JaffaCakes118_97d984436c700d6b5e8a62ccdedd13a6
-
Size
120KB
-
MD5
97d984436c700d6b5e8a62ccdedd13a6
-
SHA1
02ee7709b022be94aad13fafd3ca415e6139b136
-
SHA256
452371c81ad4672ce0acf32c4757305d2962488906f169bc22e43791c141d757
-
SHA512
f525ffbeec9da4206a0633b9b4671c5a9c71f206d32b81a95c0244f5e2c83cf21cf81be37b98998a829ef4469999929cc2750692043615c758bd0458546d3810
-
SSDEEP
1536:B2hk0TzyMLxL/Pmu2WrHCqu/FDjCB9/FdBg+zaWv9aqAIw0wF:B2RTzzv3TCqu/FnCB9T6+zaW195rw
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5