General

  • Target

    a5c00ad989ee446da5f6b8626810ea9f_JaffaCakes118

  • Size

    3.8MB

  • Sample

    240818-hdryha1blb

  • MD5

    a5c00ad989ee446da5f6b8626810ea9f

  • SHA1

    c80ba99385dae502050a1b2796412f1e4f60537a

  • SHA256

    f3cfdf3a2c9441f36ea6356e8e5067fbd21fb7b662e42ac5b8c6ae36066a489d

  • SHA512

    e76530915df8efc535db095c614af26edac0fcbe61e43d54f415596740584abc02625484e59b84142f4110df5d67dabc0c6cfeb2fd102062ebd4caed4ae7d75c

  • SSDEEP

    98304:O5rN2lh3KG1fg9yCihbka77s0oLToepZ:ONsLKm49yhbd77s0IZ

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      a5c00ad989ee446da5f6b8626810ea9f_JaffaCakes118

    • Size

      3.8MB

    • MD5

      a5c00ad989ee446da5f6b8626810ea9f

    • SHA1

      c80ba99385dae502050a1b2796412f1e4f60537a

    • SHA256

      f3cfdf3a2c9441f36ea6356e8e5067fbd21fb7b662e42ac5b8c6ae36066a489d

    • SHA512

      e76530915df8efc535db095c614af26edac0fcbe61e43d54f415596740584abc02625484e59b84142f4110df5d67dabc0c6cfeb2fd102062ebd4caed4ae7d75c

    • SSDEEP

      98304:O5rN2lh3KG1fg9yCihbka77s0oLToepZ:ONsLKm49yhbd77s0IZ

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks