General
-
Target
JaffaCakes118_c91cc634437c75cf21ef32e40ae368a6bae98b0ee959dd0be21ac9d31a33779f
-
Size
4.4MB
-
Sample
241225-x9bcystqgy
-
MD5
9376e56d825a34dc4280966b0650ccd1
-
SHA1
273ffadb5ca8f2362780f4f98d0302565a8e473d
-
SHA256
c91cc634437c75cf21ef32e40ae368a6bae98b0ee959dd0be21ac9d31a33779f
-
SHA512
07ffa185f8da5b928008fde4a03d4ae40da8e8c33f4d963d04f8aee0ba010a30f9ba61a1f4e4128fd0087cc530ecbb8a0fe12d78cdfaea1dd46a112897823a84
-
SSDEEP
98304:fnM2Anp28eBxYhLrytYk2riYoBff0EDz7MXAsvs4cZF08LqbOjCGpMgvlX:vNAns8zhHyai/BH0EnYdzmKzbOjCGpMC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c91cc634437c75cf21ef32e40ae368a6bae98b0ee959dd0be21ac9d31a33779f.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c91cc634437c75cf21ef32e40ae368a6bae98b0ee959dd0be21ac9d31a33779f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
JaffaCakes118_c91cc634437c75cf21ef32e40ae368a6bae98b0ee959dd0be21ac9d31a33779f
-
Size
4.4MB
-
MD5
9376e56d825a34dc4280966b0650ccd1
-
SHA1
273ffadb5ca8f2362780f4f98d0302565a8e473d
-
SHA256
c91cc634437c75cf21ef32e40ae368a6bae98b0ee959dd0be21ac9d31a33779f
-
SHA512
07ffa185f8da5b928008fde4a03d4ae40da8e8c33f4d963d04f8aee0ba010a30f9ba61a1f4e4128fd0087cc530ecbb8a0fe12d78cdfaea1dd46a112897823a84
-
SSDEEP
98304:fnM2Anp28eBxYhLrytYk2riYoBff0EDz7MXAsvs4cZF08LqbOjCGpMgvlX:vNAns8zhHyai/BH0EnYdzmKzbOjCGpMC
-
Glupteba family
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1