General
-
Target
a8c13ca720d705eeaf065887cb067752_JaffaCakes118
-
Size
3.9MB
-
Sample
240818-31mbrawakr
-
MD5
a8c13ca720d705eeaf065887cb067752
-
SHA1
7a08d1d8ca22688d822f12012bc2a97e8e8338ea
-
SHA256
b8f7432a062776fb65d913eb3c9e7a8b3975e43ad51b1fcd868098ce0b08500e
-
SHA512
c0ec88956dd1c1bf4f8f09648edc689c46a4bab41c17ae885dfe213d7c6a9f85b5d7ecab9eda831173b7c23c46126db7e72ac1b0bc644e103ff75169a9decfff
-
SSDEEP
98304:Y8QqLhao+WzmBfg1hjtbSSa/WE4PqRkfu:Yv8ao1hjtMWE4iR
Static task
static1
Behavioral task
behavioral1
Sample
a8c13ca720d705eeaf065887cb067752_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a8c13ca720d705eeaf065887cb067752_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
a8c13ca720d705eeaf065887cb067752_JaffaCakes118
-
Size
3.9MB
-
MD5
a8c13ca720d705eeaf065887cb067752
-
SHA1
7a08d1d8ca22688d822f12012bc2a97e8e8338ea
-
SHA256
b8f7432a062776fb65d913eb3c9e7a8b3975e43ad51b1fcd868098ce0b08500e
-
SHA512
c0ec88956dd1c1bf4f8f09648edc689c46a4bab41c17ae885dfe213d7c6a9f85b5d7ecab9eda831173b7c23c46126db7e72ac1b0bc644e103ff75169a9decfff
-
SSDEEP
98304:Y8QqLhao+WzmBfg1hjtbSSa/WE4PqRkfu:Yv8ao1hjtMWE4iR
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Modifies boot configuration data using bcdedit
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1