General
-
Target
JaffaCakes118_073e6a417b5b63c6ad1c8a6a696fcc11fcd0f60fc640b6edd81fba97f8170adf
-
Size
4.5MB
-
Sample
241224-sfj1sazqdk
-
MD5
67b29bab99697abbbf1b2d2bb3129e93
-
SHA1
869909d706f73e4ef2d628a1974e2dff74c7c3a8
-
SHA256
073e6a417b5b63c6ad1c8a6a696fcc11fcd0f60fc640b6edd81fba97f8170adf
-
SHA512
b1d656320dcc7724988a004f5393b297c95fc6ce23dc52d26a20ae033bfeb24aafc16baabb5affbe3043d0db47d5fbf1dd4e2313d03d70b7c4be945a5e2dff7e
-
SSDEEP
98304:3xBwFt167RDLP18rntFWEet2Rf6bBuPO+Vq2t9v+94WU9:3cneRfP27t3BEVuPO+79WuZ
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_073e6a417b5b63c6ad1c8a6a696fcc11fcd0f60fc640b6edd81fba97f8170adf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_073e6a417b5b63c6ad1c8a6a696fcc11fcd0f60fc640b6edd81fba97f8170adf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
JaffaCakes118_073e6a417b5b63c6ad1c8a6a696fcc11fcd0f60fc640b6edd81fba97f8170adf
-
Size
4.5MB
-
MD5
67b29bab99697abbbf1b2d2bb3129e93
-
SHA1
869909d706f73e4ef2d628a1974e2dff74c7c3a8
-
SHA256
073e6a417b5b63c6ad1c8a6a696fcc11fcd0f60fc640b6edd81fba97f8170adf
-
SHA512
b1d656320dcc7724988a004f5393b297c95fc6ce23dc52d26a20ae033bfeb24aafc16baabb5affbe3043d0db47d5fbf1dd4e2313d03d70b7c4be945a5e2dff7e
-
SSDEEP
98304:3xBwFt167RDLP18rntFWEet2Rf6bBuPO+Vq2t9v+94WU9:3cneRfP27t3BEVuPO+79WuZ
-
Glupteba family
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1