General
-
Target
JaffaCakes118_9aad5487b392f9fc470d4c2451544722
-
Size
151KB
-
Sample
250405-qqcncaznt9
-
MD5
9aad5487b392f9fc470d4c2451544722
-
SHA1
46068c984668c488ef100ab6c26b494a487f9930
-
SHA256
469acc6aedab5f89e0dc6ab13b186fa4eb78dac265de8fccb9e85793a8a74415
-
SHA512
9700366139e6816044f23fe5660b2c6955070256b61d8da406cf2ae7151ce49d130e4c3d88eeffb5cc7001da7418ee6f34848db47b0f3369cd37f4dceb3fb209
-
SSDEEP
3072:Pdpygrxszdo4hJHAwUrBoyUmXr1mDvYqJDwzIxGwdLn:PSglk/VcrKK18YqW8ndLn
Static task
static1
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_9aad5487b392f9fc470d4c2451544722
-
Size
151KB
-
MD5
9aad5487b392f9fc470d4c2451544722
-
SHA1
46068c984668c488ef100ab6c26b494a487f9930
-
SHA256
469acc6aedab5f89e0dc6ab13b186fa4eb78dac265de8fccb9e85793a8a74415
-
SHA512
9700366139e6816044f23fe5660b2c6955070256b61d8da406cf2ae7151ce49d130e4c3d88eeffb5cc7001da7418ee6f34848db47b0f3369cd37f4dceb3fb209
-
SSDEEP
3072:Pdpygrxszdo4hJHAwUrBoyUmXr1mDvYqJDwzIxGwdLn:PSglk/VcrKK18YqW8ndLn
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5