General
-
Target
JaffaCakes118_a0c7c04d179e09985d9c05a4604e0f94de03a277a69063766e7ada76a409c2b8
-
Size
4.3MB
-
Sample
241229-bgc57axpcp
-
MD5
ec03896a8a190b39b474ec90a3b78f09
-
SHA1
80d945c57d13e1ab2e596432d2a04b9d96aac37d
-
SHA256
a0c7c04d179e09985d9c05a4604e0f94de03a277a69063766e7ada76a409c2b8
-
SHA512
87c6794ac9e6538b2df84b3ab76b1b8753273d5ee572cce6c67026fdb3b820da5a859047744678586eac7b6bdfed9822219d789c8866e01cbea1a4f90666957a
-
SSDEEP
98304:uerWQJgiWy4NWntC5Mnz413W5F3EDgjcdhtvrsvtDTh5Fa91pfTTQIo:uerxJmykSrE13WSguvrsvtDFa91pfvto
Static task
static1
Behavioral task
behavioral1
Sample
10b8253c4e13b73a770ae45ed7535f88249c96f0598e7acec6aebf7d56991b0e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
10b8253c4e13b73a770ae45ed7535f88249c96f0598e7acec6aebf7d56991b0e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
10b8253c4e13b73a770ae45ed7535f88249c96f0598e7acec6aebf7d56991b0e
-
Size
4.5MB
-
MD5
caf4ab5f04e68b3ff0e6f07a8309d6cf
-
SHA1
a953b3f6456422c19c8d41e970e6d8431258ad59
-
SHA256
10b8253c4e13b73a770ae45ed7535f88249c96f0598e7acec6aebf7d56991b0e
-
SHA512
56ae9dfb1031c8c678071bb421648a1d259ce8cc3e83dbf0c0f1993cef34f8966b961d6cb9c5ea35757685832a2b8511e21b3d966e4c01add9e189ea98a3e06b
-
SSDEEP
98304:OYnl7Yo+XWYIEWaqIZADQVFx2mnSLoDOSwqI65FCVq/umJsVnyqy:O2YVXWF+3FxVS3Fq84/Iyqy
-
Glupteba family
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1