Analysis

  • max time kernel
    24s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    10-06-2024 15:57

General

  • Target

    9b3acfbcc7329bb4076590bcf06405ea_JaffaCakes118.exe

  • Size

    5.0MB

  • MD5

    9b3acfbcc7329bb4076590bcf06405ea

  • SHA1

    080381c640febaac9b4fa902f6c890efe4d27f15

  • SHA256

    ac10e43cbfc02ecb3278104fd75c5ec8817100682a711318c473fd66287e23e1

  • SHA512

    7d0378f6203a70c5215bbc8a7d334256224a026ad1a32b796f866d08efb9c5e9df0ac3039bcbe18e53c07280e62a108a7188c511c4377a241ef2efd071f0a2f9

  • SSDEEP

    98304:OOmWCUAtacMcP75xJIaZKcrVjYjJ5xxg57Vx9YvXR6PNjTAz8HASWOK1:O3WWDMcP75xJIVJi7Vxu0PNQz8gfb

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 16 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b3acfbcc7329bb4076590bcf06405ea_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9b3acfbcc7329bb4076590bcf06405ea_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1824
    • C:\Users\Admin\AppData\Local\Temp\9b3acfbcc7329bb4076590bcf06405ea_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\9b3acfbcc7329bb4076590bcf06405ea_JaffaCakes118.exe"
      2⤵
        PID:2488
        • C:\Windows\system32\cmd.exe
          C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
          3⤵
            PID:2780
            • C:\Windows\system32\netsh.exe
              netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
              4⤵
              • Modifies Windows Firewall
              PID:2552
          • C:\Windows\rss\csrss.exe
            C:\Windows\rss\csrss.exe /6-JaffaCakes118
            3⤵
              PID:1260
        • C:\Windows\system32\makecab.exe
          "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240610155748.log C:\Windows\Logs\CBS\CbsPersist_20240610155748.cab
          1⤵
            PID:2892

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \Windows\rss\csrss.exe

            Filesize

            5.0MB

            MD5

            9b3acfbcc7329bb4076590bcf06405ea

            SHA1

            080381c640febaac9b4fa902f6c890efe4d27f15

            SHA256

            ac10e43cbfc02ecb3278104fd75c5ec8817100682a711318c473fd66287e23e1

            SHA512

            7d0378f6203a70c5215bbc8a7d334256224a026ad1a32b796f866d08efb9c5e9df0ac3039bcbe18e53c07280e62a108a7188c511c4377a241ef2efd071f0a2f9

          • memory/1260-42-0x0000000000400000-0x000000000110C000-memory.dmp

            Filesize

            13.0MB

          • memory/1260-41-0x0000000000400000-0x000000000110C000-memory.dmp

            Filesize

            13.0MB

          • memory/1260-39-0x0000000000400000-0x000000000110C000-memory.dmp

            Filesize

            13.0MB

          • memory/1260-38-0x0000000000400000-0x000000000110C000-memory.dmp

            Filesize

            13.0MB

          • memory/1260-37-0x0000000000400000-0x000000000110C000-memory.dmp

            Filesize

            13.0MB

          • memory/1260-36-0x0000000000400000-0x000000000110C000-memory.dmp

            Filesize

            13.0MB

          • memory/1260-34-0x0000000000400000-0x000000000110C000-memory.dmp

            Filesize

            13.0MB

          • memory/1260-33-0x0000000002E20000-0x00000000032EB000-memory.dmp

            Filesize

            4.8MB

          • memory/1824-7-0x0000000000400000-0x0000000000AE9000-memory.dmp

            Filesize

            6.9MB

          • memory/1824-6-0x0000000002E70000-0x000000000333B000-memory.dmp

            Filesize

            4.8MB

          • memory/1824-5-0x0000000000400000-0x000000000110C000-memory.dmp

            Filesize

            13.0MB

          • memory/1824-1-0x0000000002E70000-0x000000000333B000-memory.dmp

            Filesize

            4.8MB

          • memory/1824-4-0x0000000000400000-0x000000000110C000-memory.dmp

            Filesize

            13.0MB

          • memory/1824-3-0x0000000000400000-0x000000000110C000-memory.dmp

            Filesize

            13.0MB

          • memory/1824-2-0x0000000000400000-0x0000000000AE9000-memory.dmp

            Filesize

            6.9MB

          • memory/1824-0-0x0000000002E70000-0x000000000333B000-memory.dmp

            Filesize

            4.8MB

          • memory/2488-21-0x0000000000400000-0x000000000110C000-memory.dmp

            Filesize

            13.0MB

          • memory/2488-22-0x0000000000400000-0x000000000110C000-memory.dmp

            Filesize

            13.0MB

          • memory/2488-20-0x0000000000400000-0x000000000110C000-memory.dmp

            Filesize

            13.0MB

          • memory/2488-32-0x0000000000400000-0x000000000110C000-memory.dmp

            Filesize

            13.0MB

          • memory/2488-19-0x0000000002E70000-0x000000000333B000-memory.dmp

            Filesize

            4.8MB