General
-
Target
956f93f6ca80f29e965e060671f9fe49_JaffaCakes118
-
Size
3.7MB
-
Sample
240604-tekrcscg48
-
MD5
956f93f6ca80f29e965e060671f9fe49
-
SHA1
ae17dc8820837dc4f627351c5a2e8534b1690202
-
SHA256
9a59d10aa896213b14ce316e37e1cf143beae3e218fa1a0a59a4e8fb12d36d14
-
SHA512
482c107e3789fdf16fc6d62121647afa9b7138400d4401b476683f842726105cb1a96ae479082f52b1ad4ee79dfbdc68c8efbb8988d467f8f62fa31db4997af1
-
SSDEEP
49152:nX1I6sBjwK2GkA8jGyGaeqm2c4LhMNXPllwEU/UHVzPbt02n1seshOGsfNRsH3km:XKBoG+jVeR2Jh8dlu6PBN1Wy7sa7K
Static task
static1
Behavioral task
behavioral1
Sample
956f93f6ca80f29e965e060671f9fe49_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
956f93f6ca80f29e965e060671f9fe49_JaffaCakes118
-
Size
3.7MB
-
MD5
956f93f6ca80f29e965e060671f9fe49
-
SHA1
ae17dc8820837dc4f627351c5a2e8534b1690202
-
SHA256
9a59d10aa896213b14ce316e37e1cf143beae3e218fa1a0a59a4e8fb12d36d14
-
SHA512
482c107e3789fdf16fc6d62121647afa9b7138400d4401b476683f842726105cb1a96ae479082f52b1ad4ee79dfbdc68c8efbb8988d467f8f62fa31db4997af1
-
SSDEEP
49152:nX1I6sBjwK2GkA8jGyGaeqm2c4LhMNXPllwEU/UHVzPbt02n1seshOGsfNRsH3km:XKBoG+jVeR2Jh8dlu6PBN1Wy7sa7K
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1