General

  • Target

    JaffaCakes118_334263f954599c2e3238099f9e87e72a446559787706a668969550d78752f9bf

  • Size

    4.4MB

  • Sample

    241223-w28g2sxkfp

  • MD5

    e52b5d1d057b37c1c197bfacd0dcacbd

  • SHA1

    75ba76f2f5a154d85ad7a7388fecb774903396fc

  • SHA256

    334263f954599c2e3238099f9e87e72a446559787706a668969550d78752f9bf

  • SHA512

    568a7680a91b661af24ef47539c8b17c00d8d3668916ff92bab05819e7743118a57e3a2ee618b53633eadc969d86e1c64687aef13a18afe5c88ca4afb9b340bb

  • SSDEEP

    98304:EjZPVdbff+k0Rqfdsl/LaJHgfMoETmbTg/h36gH6mnbGTxyAVGDIUjC7lG:+f2k0z/D5ETmb8BFambGtdoA7lG

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      JaffaCakes118_334263f954599c2e3238099f9e87e72a446559787706a668969550d78752f9bf

    • Size

      4.4MB

    • MD5

      e52b5d1d057b37c1c197bfacd0dcacbd

    • SHA1

      75ba76f2f5a154d85ad7a7388fecb774903396fc

    • SHA256

      334263f954599c2e3238099f9e87e72a446559787706a668969550d78752f9bf

    • SHA512

      568a7680a91b661af24ef47539c8b17c00d8d3668916ff92bab05819e7743118a57e3a2ee618b53633eadc969d86e1c64687aef13a18afe5c88ca4afb9b340bb

    • SSDEEP

      98304:EjZPVdbff+k0Rqfdsl/LaJHgfMoETmbTg/h36gH6mnbGTxyAVGDIUjC7lG:+f2k0z/D5ETmb8BFambGtdoA7lG

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks