General
-
Target
JaffaCakes118_c3ec1b42747d7b00d2b1731f119948ed4a5dc6b6444b44a0cb75c5cdaa51c457
-
Size
4.3MB
-
Sample
241230-drj3lawnez
-
MD5
2b4c61f3d7884d568df60b922f7b49a9
-
SHA1
1d92f537f13ccec705f134573225103f2bde8d5a
-
SHA256
c3ec1b42747d7b00d2b1731f119948ed4a5dc6b6444b44a0cb75c5cdaa51c457
-
SHA512
8d2b846edfd82351095213de19f98255c27680fca7f692ea52e8585b217d4f6607222d55fe231310ba75468c5fbd1ac799b854891471b5d4497ad0dc81978c5e
-
SSDEEP
98304:uOCn+bijOFZtbbdEhHPtd/LVRxo7mIJRj+NgF4fjun8c+:RzDtbbdEhb1amiRj+NgFJ83
Static task
static1
Behavioral task
behavioral1
Sample
2f0d8d86c4d58dacce0af177f008132e585bc496c1f536105af0e33949f8fda8.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2f0d8d86c4d58dacce0af177f008132e585bc496c1f536105af0e33949f8fda8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
2f0d8d86c4d58dacce0af177f008132e585bc496c1f536105af0e33949f8fda8
-
Size
4.5MB
-
MD5
24d9f4fabdce7c90cd5feedc8d149329
-
SHA1
89724901921030ce1bc3915cd4d84ebccfe7dc18
-
SHA256
2f0d8d86c4d58dacce0af177f008132e585bc496c1f536105af0e33949f8fda8
-
SHA512
c919d455e236c3ebda9936931e76ba28fa2346b550b32a131538553d3581671a6efbf8fdc5fed477cd6c336118f2c9ca3ce2cc827d4f7baa65bc01350e8fd2cd
-
SSDEEP
98304:Kb4zwXjlrKOaiydVjiXseEYkyc9ejHtvuQ4KH5IEJ21GM8n1jG3Sp0BnCmNcNYi:KRj9KO60XxSZ4d4wGEJ2+mSqBnimi
-
Glupteba family
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1