General
-
Target
JaffaCakes118_aaf7e472921922ade1e7c9cb27e35c1dc708cb6d45483d37071602136b20ba26
-
Size
4.3MB
-
Sample
241223-s1aylstkhz
-
MD5
cfad8bfb3c2074751ae4e9f724635744
-
SHA1
d6a64b37ebfe11079f941616c75d0cde8fd6d0c8
-
SHA256
aaf7e472921922ade1e7c9cb27e35c1dc708cb6d45483d37071602136b20ba26
-
SHA512
bd2ad348018b8804f5d6eb2100ea8a3fcb3ce08997638b72c077e5fd0d9c1a28e0b74f7ee50b3fbf685649fdebede135100c8cf5343a399c81e1ffd749497e14
-
SSDEEP
98304:TyNCpIHyWoh85u+ACGFwazWxjniMvSqqhRVriNd7UUDUeq:TyKYborFHimcCrOvq
Static task
static1
Behavioral task
behavioral1
Sample
b4489e07ddca61504faf50141f55f91e68976a2c39d1d852eb274ce62dbbb5fe.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4489e07ddca61504faf50141f55f91e68976a2c39d1d852eb274ce62dbbb5fe.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
b4489e07ddca61504faf50141f55f91e68976a2c39d1d852eb274ce62dbbb5fe
-
Size
4.5MB
-
MD5
e724715d072700d2e91eb3ffac9ff1e6
-
SHA1
055981894f7c4606243a67e53f944adc9fd7e7d8
-
SHA256
b4489e07ddca61504faf50141f55f91e68976a2c39d1d852eb274ce62dbbb5fe
-
SHA512
2acb2540a45869c82c2f9b48a39f954364872980bc9d284ef5d408f5d5006e1c2801427fd0d9efa424142dc91a55b80303603cf2275f3fc7dc582e7db2f79905
-
SSDEEP
98304:6LBiqDDOOBWpVqASIS/FFFDgeX4QYlnfOz:6LQ5SI8FntX4Q6nC
-
Glupteba family
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1