General
-
Target
JaffaCakes118_20cb9ecc70b18f7f3c51c1500fbefc5898cb5a18d2c95893eeda3fd117506807
-
Size
4.3MB
-
Sample
241225-qhb2vatmgx
-
MD5
444bd62bc489c1a3e2f40464b061699c
-
SHA1
2bb5b1793cd2d5b764321936ce3aa9331a261242
-
SHA256
20cb9ecc70b18f7f3c51c1500fbefc5898cb5a18d2c95893eeda3fd117506807
-
SHA512
3ded0151a2e854cac39df70bf11bf903767870dfef1e077e4e6b93984bbf175e0445c314666c21fe3d3af482bee507322eeb23e01b857434ce74c6d8340d70c1
-
SSDEEP
98304:Yn/WK7CewT2AG3KO6Wcvv28FInlumbAGvYkN6WWv8QXZ0SbI:Y/WXi0O6V+l9Au678Qpt8
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_20cb9ecc70b18f7f3c51c1500fbefc5898cb5a18d2c95893eeda3fd117506807.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_20cb9ecc70b18f7f3c51c1500fbefc5898cb5a18d2c95893eeda3fd117506807.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
JaffaCakes118_20cb9ecc70b18f7f3c51c1500fbefc5898cb5a18d2c95893eeda3fd117506807
-
Size
4.3MB
-
MD5
444bd62bc489c1a3e2f40464b061699c
-
SHA1
2bb5b1793cd2d5b764321936ce3aa9331a261242
-
SHA256
20cb9ecc70b18f7f3c51c1500fbefc5898cb5a18d2c95893eeda3fd117506807
-
SHA512
3ded0151a2e854cac39df70bf11bf903767870dfef1e077e4e6b93984bbf175e0445c314666c21fe3d3af482bee507322eeb23e01b857434ce74c6d8340d70c1
-
SSDEEP
98304:Yn/WK7CewT2AG3KO6Wcvv28FInlumbAGvYkN6WWv8QXZ0SbI:Y/WXi0O6V+l9Au678Qpt8
-
Glupteba family
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1