General
-
Target
JaffaCakes118_fb1af32a17eb1bb3d305c215373fa382c1698856c17b732925b2f078ccb18e52
-
Size
4.1MB
-
Sample
241222-fnd4aavmbl
-
MD5
e937d26970adffe1cdfc1d1b85250905
-
SHA1
5bcf05719b3c06352969eb643b640a7024cc748c
-
SHA256
fb1af32a17eb1bb3d305c215373fa382c1698856c17b732925b2f078ccb18e52
-
SHA512
c6000277d2ab9d7ccbf67733c9e5a52ff7c05bd2e9162ebc42079b9e43cf574d127bb228b7323b46c345cb9b229fcbb95b359736fe7f6ea41be8d2fb9a175d7c
-
SSDEEP
98304:d1CDNt1QABzrHK6/M4V3Bqw9QufvaJNi4a2qapmOMGQLZpDw1f/M:ytbBzm6zV3wAvarFa2KGQqXM
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fb1af32a17eb1bb3d305c215373fa382c1698856c17b732925b2f078ccb18e52.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_fb1af32a17eb1bb3d305c215373fa382c1698856c17b732925b2f078ccb18e52.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_fb1af32a17eb1bb3d305c215373fa382c1698856c17b732925b2f078ccb18e52
-
Size
4.1MB
-
MD5
e937d26970adffe1cdfc1d1b85250905
-
SHA1
5bcf05719b3c06352969eb643b640a7024cc748c
-
SHA256
fb1af32a17eb1bb3d305c215373fa382c1698856c17b732925b2f078ccb18e52
-
SHA512
c6000277d2ab9d7ccbf67733c9e5a52ff7c05bd2e9162ebc42079b9e43cf574d127bb228b7323b46c345cb9b229fcbb95b359736fe7f6ea41be8d2fb9a175d7c
-
SSDEEP
98304:d1CDNt1QABzrHK6/M4V3Bqw9QufvaJNi4a2qapmOMGQLZpDw1f/M:ytbBzm6zV3wAvarFa2KGQqXM
-
Glupteba family
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1