General

  • Target

    JaffaCakes118_57058bfec0c5d8e2a3a9a3674056969a3cf3d701e428e951486c5b1faae0c0b8

  • Size

    4.4MB

  • Sample

    241223-tc816stpd1

  • MD5

    d569bfd39de0b5cb78888a7833e8f92f

  • SHA1

    ed7e0798a3980d23a8dd54dd23f8f60f0d843529

  • SHA256

    57058bfec0c5d8e2a3a9a3674056969a3cf3d701e428e951486c5b1faae0c0b8

  • SHA512

    f0d943072270687b31f67f1347ef77b1e5d765e8933565e93972920935bc91ad2a1fda39ad1183b62b96997c0a198cdf6896b4438afb034b6586bfb3503fff1d

  • SSDEEP

    98304:PccuZ976e6PtbkO6q2NuNA2Jb7j0guwCmKrKTONHCO3+KJlmcU:kcuZ97YKq2yR0gRnQCOu5x

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      JaffaCakes118_57058bfec0c5d8e2a3a9a3674056969a3cf3d701e428e951486c5b1faae0c0b8

    • Size

      4.4MB

    • MD5

      d569bfd39de0b5cb78888a7833e8f92f

    • SHA1

      ed7e0798a3980d23a8dd54dd23f8f60f0d843529

    • SHA256

      57058bfec0c5d8e2a3a9a3674056969a3cf3d701e428e951486c5b1faae0c0b8

    • SHA512

      f0d943072270687b31f67f1347ef77b1e5d765e8933565e93972920935bc91ad2a1fda39ad1183b62b96997c0a198cdf6896b4438afb034b6586bfb3503fff1d

    • SSDEEP

      98304:PccuZ976e6PtbkO6q2NuNA2Jb7j0guwCmKrKTONHCO3+KJlmcU:kcuZ97YKq2yR0gRnQCOu5x

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks