General
-
Target
JaffaCakes118_e7cb0dbaf7bac40cbcc13b58aa2493132fd958667e46427b2e023a624b13e484
-
Size
4.4MB
-
Sample
241230-zene5sxnfk
-
MD5
1a44ed4b06b9f1085f0524e13ad58ce8
-
SHA1
3d2cd7c63e79f03c809b3e51c0cdc39c406af728
-
SHA256
e7cb0dbaf7bac40cbcc13b58aa2493132fd958667e46427b2e023a624b13e484
-
SHA512
604baca36cf0fd8d7f135f55e0699896c6dbb9ddfe8372a02b0705aee0bac76d70cc99289721d393f3a826189933d48786c944e3840c0fe77739901ff816b485
-
SSDEEP
98304:0nHJVPvYXuJjm+dK2C/yVl2cmy5huH7ySghK1VK0:iHLX/dJ9ycmyuPg4nK0
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e7cb0dbaf7bac40cbcc13b58aa2493132fd958667e46427b2e023a624b13e484.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e7cb0dbaf7bac40cbcc13b58aa2493132fd958667e46427b2e023a624b13e484.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
JaffaCakes118_e7cb0dbaf7bac40cbcc13b58aa2493132fd958667e46427b2e023a624b13e484
-
Size
4.4MB
-
MD5
1a44ed4b06b9f1085f0524e13ad58ce8
-
SHA1
3d2cd7c63e79f03c809b3e51c0cdc39c406af728
-
SHA256
e7cb0dbaf7bac40cbcc13b58aa2493132fd958667e46427b2e023a624b13e484
-
SHA512
604baca36cf0fd8d7f135f55e0699896c6dbb9ddfe8372a02b0705aee0bac76d70cc99289721d393f3a826189933d48786c944e3840c0fe77739901ff816b485
-
SSDEEP
98304:0nHJVPvYXuJjm+dK2C/yVl2cmy5huH7ySghK1VK0:iHLX/dJ9ycmyuPg4nK0
-
Glupteba family
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1