General

  • Target

    b1f2d0b40827c4923df9074d535a1401_JaffaCakes118

  • Size

    832KB

  • Sample

    241129-r64mfavrhp

  • MD5

    b1f2d0b40827c4923df9074d535a1401

  • SHA1

    4d483e84d6c62b7764ba4c7d657393d476ccf647

  • SHA256

    e047ffd376de7091472a9259813e9e91790fd8dd4ff5ba90a7054242f6b075e6

  • SHA512

    3576ee0dfecc01f1fe049e07e2f84566dfae2bbb84c06a210fea5916b02afe912c50dfdf43288de70c03bfef3a9a7c9227c239d1e875b01f479e70c80a25d433

  • SSDEEP

    12288:7XrHTWz5AkGaOTTAPWwC3kAH4cdzG7Qd0ynYaJflJy2jhFR5Nl3s2r3eIYQ5yws:DjCV0TbL37YKSaJf221F/82r3eJQn

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      b1f2d0b40827c4923df9074d535a1401_JaffaCakes118

    • Size

      832KB

    • MD5

      b1f2d0b40827c4923df9074d535a1401

    • SHA1

      4d483e84d6c62b7764ba4c7d657393d476ccf647

    • SHA256

      e047ffd376de7091472a9259813e9e91790fd8dd4ff5ba90a7054242f6b075e6

    • SHA512

      3576ee0dfecc01f1fe049e07e2f84566dfae2bbb84c06a210fea5916b02afe912c50dfdf43288de70c03bfef3a9a7c9227c239d1e875b01f479e70c80a25d433

    • SSDEEP

      12288:7XrHTWz5AkGaOTTAPWwC3kAH4cdzG7Qd0ynYaJflJy2jhFR5Nl3s2r3eIYQ5yws:DjCV0TbL37YKSaJf221F/82r3eJQn

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Drops file in Drivers directory

    • Deletes itself

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks