General
-
Target
JaffaCakes118_6f1bf8005ecbbabd6efafc9aeeaf9e9293d25082b5acdddfe2c148a001bdb7d4
-
Size
4.2MB
-
Sample
241223-qk53pszrcs
-
MD5
6221d0c3dc4377dfdf430c17e79d3195
-
SHA1
fcba24562eed1b0581c57c042ef00eb08a081ac3
-
SHA256
6f1bf8005ecbbabd6efafc9aeeaf9e9293d25082b5acdddfe2c148a001bdb7d4
-
SHA512
2162e273054bdb950d0e07c9de315162ea340ee4f54903967d044ae22788c01b9e6505a3eaf59bec314d21ea24381609df9494b8e024c6c9c7a0dc5c4e4a20d0
-
SSDEEP
98304:lv0WfoCx4wVuIPM5qbck5RxfSgLgOf81mPlw9M40WDEXsNr7:Z/ow48uSiqbcITTZwK40WDjP
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6f1bf8005ecbbabd6efafc9aeeaf9e9293d25082b5acdddfe2c148a001bdb7d4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6f1bf8005ecbbabd6efafc9aeeaf9e9293d25082b5acdddfe2c148a001bdb7d4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
JaffaCakes118_6f1bf8005ecbbabd6efafc9aeeaf9e9293d25082b5acdddfe2c148a001bdb7d4
-
Size
4.2MB
-
MD5
6221d0c3dc4377dfdf430c17e79d3195
-
SHA1
fcba24562eed1b0581c57c042ef00eb08a081ac3
-
SHA256
6f1bf8005ecbbabd6efafc9aeeaf9e9293d25082b5acdddfe2c148a001bdb7d4
-
SHA512
2162e273054bdb950d0e07c9de315162ea340ee4f54903967d044ae22788c01b9e6505a3eaf59bec314d21ea24381609df9494b8e024c6c9c7a0dc5c4e4a20d0
-
SSDEEP
98304:lv0WfoCx4wVuIPM5qbck5RxfSgLgOf81mPlw9M40WDEXsNr7:Z/ow48uSiqbcITTZwK40WDjP
-
Glupteba family
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1