General
-
Target
JaffaCakes118_b20f81fb47552c53596f7201fcc6fce5
-
Size
442KB
-
Sample
250412-1rvwesssgs
-
MD5
b20f81fb47552c53596f7201fcc6fce5
-
SHA1
314d7fe009913822751d9595f88def4fe581faa5
-
SHA256
21d7bdb440170f9f5cd4872de7f91751046d53f0bca086902ef9a1bf0ecc99ee
-
SHA512
fcfefe5f24cade8c89b7fc0540554c5eeb0b75e06d1261a8ec81ba31eb1ee2b4945a0ba73485a9f6b44288cef31923215c175c1f552ecd0fb52cc66ff08fab09
-
SSDEEP
6144:G6gI4u6lXnxh65Qr8kxo97piM3LVb0kiP3+7Pl/W9eClX1EZrq:Gq4hxhQQbxS1iMukiP3+U9eCwZrq
Static task
static1
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
JaffaCakes118_b20f81fb47552c53596f7201fcc6fce5
-
Size
442KB
-
MD5
b20f81fb47552c53596f7201fcc6fce5
-
SHA1
314d7fe009913822751d9595f88def4fe581faa5
-
SHA256
21d7bdb440170f9f5cd4872de7f91751046d53f0bca086902ef9a1bf0ecc99ee
-
SHA512
fcfefe5f24cade8c89b7fc0540554c5eeb0b75e06d1261a8ec81ba31eb1ee2b4945a0ba73485a9f6b44288cef31923215c175c1f552ecd0fb52cc66ff08fab09
-
SSDEEP
6144:G6gI4u6lXnxh65Qr8kxo97piM3LVb0kiP3+7Pl/W9eClX1EZrq:Gq4hxhQQbxS1iMukiP3+U9eCwZrq
-
Ramnit family
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v16
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4