General
-
Target
a2d68ce5a4a5f47d2aa001a4dd83ef57_JaffaCakes118
-
Size
3.9MB
-
Sample
240612-22a5faxhmq
-
MD5
a2d68ce5a4a5f47d2aa001a4dd83ef57
-
SHA1
3d8b1ba65986eba4eaf0830c10a494121563b19a
-
SHA256
f3670a92b119dfb5e46d0410b3399648214f9125dee469675c7431b84075f755
-
SHA512
b613b777885d69d9ea47875632088df2cfae1d3f7ed0d9c65ccc4e614afa3a4c3616e1ba69d1f35fa669d84147ab6de9368c5964ed54fa516b510bc58c6092ae
-
SSDEEP
98304:HxW6BwOL4D6l/LtKCs2M1N1yMHPXBNI1qT/AhRg0FSLQwWuBjWo:HxW4wM4D6l/Lto2EN1HHPxNI1qTYhe3Z
Static task
static1
Behavioral task
behavioral1
Sample
a2d68ce5a4a5f47d2aa001a4dd83ef57_JaffaCakes118.exe
Resource
win7-20240220-en
Malware Config
Targets
-
-
Target
a2d68ce5a4a5f47d2aa001a4dd83ef57_JaffaCakes118
-
Size
3.9MB
-
MD5
a2d68ce5a4a5f47d2aa001a4dd83ef57
-
SHA1
3d8b1ba65986eba4eaf0830c10a494121563b19a
-
SHA256
f3670a92b119dfb5e46d0410b3399648214f9125dee469675c7431b84075f755
-
SHA512
b613b777885d69d9ea47875632088df2cfae1d3f7ed0d9c65ccc4e614afa3a4c3616e1ba69d1f35fa669d84147ab6de9368c5964ed54fa516b510bc58c6092ae
-
SSDEEP
98304:HxW6BwOL4D6l/LtKCs2M1N1yMHPXBNI1qT/AhRg0FSLQwWuBjWo:HxW4wM4D6l/Lto2EN1HHPxNI1qTYhe3Z
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1