General

  • Target

    c6121682f0df6ec10c470fbc4d65bf48_JaffaCakes118

  • Size

    151KB

  • Sample

    241205-fxca2swncj

  • MD5

    c6121682f0df6ec10c470fbc4d65bf48

  • SHA1

    83a8cf58ed6937380bcac160202becd148d6bef2

  • SHA256

    062d3b9e6fe74d35bdef0c5cfbd3297c5e513585e1985d7a831a1762fc3fc021

  • SHA512

    0f3395c25cb76971c193857a05fa885ff4b8ff4d197ff28319daf440ca258e066c098d4b8227af4a8f3620387d179c0c668e16dfeab80f9f1ea3f55d7bb880cd

  • SSDEEP

    3072:Z9Cg/6nVnE/HxE9hWtZrm6N+z6pG9IIupTjuWC/g3WMCvPajGmg2rSi6c:Z9Cg/6nVnMxSQG7z6AWIupTj19CvmX

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      c6121682f0df6ec10c470fbc4d65bf48_JaffaCakes118

    • Size

      151KB

    • MD5

      c6121682f0df6ec10c470fbc4d65bf48

    • SHA1

      83a8cf58ed6937380bcac160202becd148d6bef2

    • SHA256

      062d3b9e6fe74d35bdef0c5cfbd3297c5e513585e1985d7a831a1762fc3fc021

    • SHA512

      0f3395c25cb76971c193857a05fa885ff4b8ff4d197ff28319daf440ca258e066c098d4b8227af4a8f3620387d179c0c668e16dfeab80f9f1ea3f55d7bb880cd

    • SSDEEP

      3072:Z9Cg/6nVnE/HxE9hWtZrm6N+z6pG9IIupTjuWC/g3WMCvPajGmg2rSi6c:Z9Cg/6nVnMxSQG7z6AWIupTj19CvmX

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies security service

    • Windows security bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Looks for VMWare Tools registry key

    • Modifies Windows Firewall

    • Deletes itself

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks