General
-
Target
94b553b39874e2b86cd7c1a327b19312_JaffaCakes118
-
Size
3.7MB
-
Sample
240813-zsbcqszhjn
-
MD5
94b553b39874e2b86cd7c1a327b19312
-
SHA1
2b251e352c46ca15c164848d67a4cce9c63e7c23
-
SHA256
9a76f29561a031acfce3746f034be1f0de19391b70f617c8095ea88a9fa6cdba
-
SHA512
c728f0db6f812cedc56a088ff38f851839a649bb05bca0d85cbb29e43d4ffc6e368a52068c4b1b3b595932fe6b79d19e30ec514579ebf8c62d2f2f7641da054e
-
SSDEEP
98304:x/tVmJ1nOcOVMBNNxnqVyv9IoLgXsVvnDrcTEXzq5K:lYgcOVMBNNRSockDaEXuI
Static task
static1
Behavioral task
behavioral1
Sample
94b553b39874e2b86cd7c1a327b19312_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
94b553b39874e2b86cd7c1a327b19312_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
94b553b39874e2b86cd7c1a327b19312_JaffaCakes118
-
Size
3.7MB
-
MD5
94b553b39874e2b86cd7c1a327b19312
-
SHA1
2b251e352c46ca15c164848d67a4cce9c63e7c23
-
SHA256
9a76f29561a031acfce3746f034be1f0de19391b70f617c8095ea88a9fa6cdba
-
SHA512
c728f0db6f812cedc56a088ff38f851839a649bb05bca0d85cbb29e43d4ffc6e368a52068c4b1b3b595932fe6b79d19e30ec514579ebf8c62d2f2f7641da054e
-
SSDEEP
98304:x/tVmJ1nOcOVMBNNxnqVyv9IoLgXsVvnDrcTEXzq5K:lYgcOVMBNNRSockDaEXuI
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1