General

  • Target

    JaffaCakes118_21ded75aa6785bc9b1f9b1bfc0ab0ac0e196a4661a4f90ea9f4a97705699070c

  • Size

    4.4MB

  • Sample

    241224-svh22azqhy

  • MD5

    3db6f482ac0d29e32d5e885ba25802b6

  • SHA1

    716f1c60608433320f38bd249d4230b48fc041a9

  • SHA256

    21ded75aa6785bc9b1f9b1bfc0ab0ac0e196a4661a4f90ea9f4a97705699070c

  • SHA512

    edcdbe2f703efe0fc1e19cb19bb3449ce4415d245ac23a1854622c25c96f6dd6d0449768598c7ef707f0d4dff377b1016c5eb12224210f5e866fe33e5251e4bb

  • SSDEEP

    98304:3lRYg/L4L2zhluo/tmYfo9JbbXKiYXYEI8+6os:3l7tH5wrXKtXvIKos

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      JaffaCakes118_21ded75aa6785bc9b1f9b1bfc0ab0ac0e196a4661a4f90ea9f4a97705699070c

    • Size

      4.4MB

    • MD5

      3db6f482ac0d29e32d5e885ba25802b6

    • SHA1

      716f1c60608433320f38bd249d4230b48fc041a9

    • SHA256

      21ded75aa6785bc9b1f9b1bfc0ab0ac0e196a4661a4f90ea9f4a97705699070c

    • SHA512

      edcdbe2f703efe0fc1e19cb19bb3449ce4415d245ac23a1854622c25c96f6dd6d0449768598c7ef707f0d4dff377b1016c5eb12224210f5e866fe33e5251e4bb

    • SSDEEP

      98304:3lRYg/L4L2zhluo/tmYfo9JbbXKiYXYEI8+6os:3l7tH5wrXKtXvIKos

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks