General
-
Target
JaffaCakes118_1e5902f7e7182f9296f4df26f87dc1ec4888852d69a12348da07a0c9aa301324
-
Size
4.3MB
-
Sample
241226-29c9rsvjes
-
MD5
c7db90ff52c7b3c840103cd57b5340bd
-
SHA1
52b6675e621b54f477373aec43fdbec3e8385683
-
SHA256
1e5902f7e7182f9296f4df26f87dc1ec4888852d69a12348da07a0c9aa301324
-
SHA512
17437977d5e54d1ed0aa919c9dc4b21f4bf938588c7962987b1a602a2ded7c6281fbdaf471425d65d5d473d1d6bd0ca46f9c5f34be6f39a9b54ac3dea904e99e
-
SSDEEP
98304:aM7Pv7+UY+73SpmsB6ud/S/LKh7Iy/jMWdMF4aHC9E8/PH:aOPvmCMQudK/LwMuFdM9QH
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1e5902f7e7182f9296f4df26f87dc1ec4888852d69a12348da07a0c9aa301324.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1e5902f7e7182f9296f4df26f87dc1ec4888852d69a12348da07a0c9aa301324.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
JaffaCakes118_1e5902f7e7182f9296f4df26f87dc1ec4888852d69a12348da07a0c9aa301324
-
Size
4.3MB
-
MD5
c7db90ff52c7b3c840103cd57b5340bd
-
SHA1
52b6675e621b54f477373aec43fdbec3e8385683
-
SHA256
1e5902f7e7182f9296f4df26f87dc1ec4888852d69a12348da07a0c9aa301324
-
SHA512
17437977d5e54d1ed0aa919c9dc4b21f4bf938588c7962987b1a602a2ded7c6281fbdaf471425d65d5d473d1d6bd0ca46f9c5f34be6f39a9b54ac3dea904e99e
-
SSDEEP
98304:aM7Pv7+UY+73SpmsB6ud/S/LKh7Iy/jMWdMF4aHC9E8/PH:aOPvmCMQudK/LwMuFdM9QH
-
Glupteba family
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1