General
-
Target
JaffaCakes118_cbd42f44c0f85e54a7f5a67e58dc08004596b973a8238b01c4e767729a78f74f
-
Size
4.0MB
-
Sample
241224-2z7evszmb1
-
MD5
78eec9b8c977f035f2cb90667e9f203c
-
SHA1
f3fa4b6b5aae55f4c52dd9ca6abcadc5b46b9b33
-
SHA256
cbd42f44c0f85e54a7f5a67e58dc08004596b973a8238b01c4e767729a78f74f
-
SHA512
a2967acd38ba3023fc1c69e8990d139fac539c1fc36e4caaff5b2eae2b9119621cf3991ac6d6558cca131a78634424e6021c390a84095d4dfaec114959b05f2b
-
SSDEEP
98304:gp8JoKXC6WjoKqJaDVm2GI7sqJLxOXzyuwCpCGh8Za5cYFlD:BojvjTqJaxm2XVxOjSCRhr5cYF5
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_cbd42f44c0f85e54a7f5a67e58dc08004596b973a8238b01c4e767729a78f74f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_cbd42f44c0f85e54a7f5a67e58dc08004596b973a8238b01c4e767729a78f74f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_cbd42f44c0f85e54a7f5a67e58dc08004596b973a8238b01c4e767729a78f74f
-
Size
4.0MB
-
MD5
78eec9b8c977f035f2cb90667e9f203c
-
SHA1
f3fa4b6b5aae55f4c52dd9ca6abcadc5b46b9b33
-
SHA256
cbd42f44c0f85e54a7f5a67e58dc08004596b973a8238b01c4e767729a78f74f
-
SHA512
a2967acd38ba3023fc1c69e8990d139fac539c1fc36e4caaff5b2eae2b9119621cf3991ac6d6558cca131a78634424e6021c390a84095d4dfaec114959b05f2b
-
SSDEEP
98304:gp8JoKXC6WjoKqJaDVm2GI7sqJLxOXzyuwCpCGh8Za5cYFlD:BojvjTqJaxm2XVxOjSCRhr5cYF5
-
Glupteba family
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1