General
-
Target
JaffaCakes118_9af6e528c059d1b4edd346dc38f959d2
-
Size
124KB
-
Sample
250405-s8a9ca1ta1
-
MD5
9af6e528c059d1b4edd346dc38f959d2
-
SHA1
b831e545904a446bcf4fd46271a6af25c87df8f2
-
SHA256
1a68665f44ddc7e3fa54efe5eadc25e71b54598cc867b99b032422eb75e26cd1
-
SHA512
623a91fb881f4bc615d5c2eb316b427f10607baa0c9e5af8dedb49900cb8a9285af261e67cf2977640efcbf219226837a0e82f223c958696aff1111af01dc69a
-
SSDEEP
3072:eSxqj+7hO1iP7ukPMiZ5CxW9ouVbgkfaIj0x:ebChO0z9Mizn7Vbg2aj
Static task
static1
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_9af6e528c059d1b4edd346dc38f959d2
-
Size
124KB
-
MD5
9af6e528c059d1b4edd346dc38f959d2
-
SHA1
b831e545904a446bcf4fd46271a6af25c87df8f2
-
SHA256
1a68665f44ddc7e3fa54efe5eadc25e71b54598cc867b99b032422eb75e26cd1
-
SHA512
623a91fb881f4bc615d5c2eb316b427f10607baa0c9e5af8dedb49900cb8a9285af261e67cf2977640efcbf219226837a0e82f223c958696aff1111af01dc69a
-
SSDEEP
3072:eSxqj+7hO1iP7ukPMiZ5CxW9ouVbgkfaIj0x:ebChO0z9Mizn7Vbg2aj
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6