General

  • Target

    d446284002f47cbf7f565e80a16c3854_JaffaCakes118

  • Size

    137KB

  • Sample

    241208-absg9awqdj

  • MD5

    d446284002f47cbf7f565e80a16c3854

  • SHA1

    9bd0cd9833efdc7154c3d7dd99914dbb17e6fbd3

  • SHA256

    11c0fd540f52098dd29fd81ade38bdee44e3f45a44485a43699d1275d253e7b6

  • SHA512

    9002454217757f2d225f81d0f967141771663ee01fc8a13ee429a8a5da67760990f6e1997eebe8169a8ff2c0c8619b6b025cd388d92d6216947a2a391556b8b8

  • SSDEEP

    3072:sjcrKunQngXHNz1i2XlCmYBsqy0f7VMzRmle4YPvjil47tJYY3:sjdu4eHL91CmYWqrxMglaWl4Z

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      d446284002f47cbf7f565e80a16c3854_JaffaCakes118

    • Size

      137KB

    • MD5

      d446284002f47cbf7f565e80a16c3854

    • SHA1

      9bd0cd9833efdc7154c3d7dd99914dbb17e6fbd3

    • SHA256

      11c0fd540f52098dd29fd81ade38bdee44e3f45a44485a43699d1275d253e7b6

    • SHA512

      9002454217757f2d225f81d0f967141771663ee01fc8a13ee429a8a5da67760990f6e1997eebe8169a8ff2c0c8619b6b025cd388d92d6216947a2a391556b8b8

    • SSDEEP

      3072:sjcrKunQngXHNz1i2XlCmYBsqy0f7VMzRmle4YPvjil47tJYY3:sjdu4eHL91CmYWqrxMglaWl4Z

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Modifies firewall policy service

    • Windows security bypass

    • Modifies Windows Firewall

    • Deletes itself

    • Executes dropped EXE

    • Windows security modification

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks