General
-
Target
JaffaCakes118_e54ac0f2c08d5fe0e4fcd71d4ae69a6376561ab9a663b389915adb601955ba11
-
Size
4.3MB
-
Sample
241229-2d281syna1
-
MD5
4c4d4fa4564e6a70ffdba48c4b8eb60b
-
SHA1
71c489e0b611d8891aeb67abed494ef360907286
-
SHA256
e54ac0f2c08d5fe0e4fcd71d4ae69a6376561ab9a663b389915adb601955ba11
-
SHA512
bd1048174be534fbce8204a4e151db2fa7c45f46df7dbd0f41b5c0307fe96a297fa0e1b4614be9622f192ef0a9ad0baafbc7818668a0d30dd2a7cabed6c7f34c
-
SSDEEP
98304:5MbbwAdbDf2AdvhbiyX/wiW/xbzVXkDf70QFraUAm8qT07WLp:+bcij2a5b5wHxbRU/0krUqTpl
Static task
static1
Behavioral task
behavioral1
Sample
91ce27ac492cd76e7791d27bd6de589c6f749a18e1c20d14a33971271467bdeb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
91ce27ac492cd76e7791d27bd6de589c6f749a18e1c20d14a33971271467bdeb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
91ce27ac492cd76e7791d27bd6de589c6f749a18e1c20d14a33971271467bdeb
-
Size
4.5MB
-
MD5
b69f6a6c9569c66264304390d154d5f6
-
SHA1
e2eafcea95c30ca0344efeaf9a006498ec53efa3
-
SHA256
91ce27ac492cd76e7791d27bd6de589c6f749a18e1c20d14a33971271467bdeb
-
SHA512
226d2a5296f12f2f0bdabcf197475e0aaf6b38913700437cf10c83be172da003ef721bf18fb260da73a7037216496192148b97304b521adac645b03858e68000
-
SSDEEP
98304:DnUEXhyS5pMhS7XEnu+Py0XYq6I/rZwsCabN7LY3ugYlo4FlR:D7XhF4Sku+PX6zsC4bm4Fl
-
Glupteba family
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1