General
-
Target
90eeaf346c46ea0bcd1fb2f5021bf1e4_JaffaCakes118
-
Size
3.7MB
-
Sample
240603-h5j2zaha64
-
MD5
90eeaf346c46ea0bcd1fb2f5021bf1e4
-
SHA1
ba54ede47d708d68e1604eb9ebe1c833cb6d5611
-
SHA256
ffe0a46cba75e45a25c380e76692adffa9fe45d456e6890f1d45fb155afa27ea
-
SHA512
bda7b9410160d66db85bbe3554468738305bf5efc50db7d36641df534679add991ffbfb3f61acfba7d97016cd56cac2938c0fc751bd9ed040ae5af7b5b8092ee
-
SSDEEP
98304:JRHjj+mmbjILa3Sh89Vhv31/v07T9NYGQN1Fqz:73e6aih89VhP1H07T9iGQK
Static task
static1
Behavioral task
behavioral1
Sample
90eeaf346c46ea0bcd1fb2f5021bf1e4_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
90eeaf346c46ea0bcd1fb2f5021bf1e4_JaffaCakes118
-
Size
3.7MB
-
MD5
90eeaf346c46ea0bcd1fb2f5021bf1e4
-
SHA1
ba54ede47d708d68e1604eb9ebe1c833cb6d5611
-
SHA256
ffe0a46cba75e45a25c380e76692adffa9fe45d456e6890f1d45fb155afa27ea
-
SHA512
bda7b9410160d66db85bbe3554468738305bf5efc50db7d36641df534679add991ffbfb3f61acfba7d97016cd56cac2938c0fc751bd9ed040ae5af7b5b8092ee
-
SSDEEP
98304:JRHjj+mmbjILa3Sh89Vhv31/v07T9NYGQN1Fqz:73e6aih89VhP1H07T9iGQK
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1