General

  • Target

    JaffaCakes118_95d12290ef06bb6439efd6380fd60039c86d0329d6d23422fdc1b50189c82f7d

  • Size

    4.3MB

  • Sample

    241225-bfsjgsspdx

  • MD5

    20b91dcb9ffeb801f0326e285af793b6

  • SHA1

    bb0ba64c20c5ece43ef747dd8fafb18a2175e1be

  • SHA256

    95d12290ef06bb6439efd6380fd60039c86d0329d6d23422fdc1b50189c82f7d

  • SHA512

    99bcb2422c0473f8d55e1fc27f03b73cf4749b247d741d44cd4b3677d17c8fa767c8e28d43d5386151b1cb36ebaa279833574117d978c6f5404dbeb2e30cc094

  • SSDEEP

    98304:R7G7INU2nn+TxiWgxNc5syFmNwXvCFXm97JN4:N75nYiW8gQNwXvk2i

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      JaffaCakes118_95d12290ef06bb6439efd6380fd60039c86d0329d6d23422fdc1b50189c82f7d

    • Size

      4.3MB

    • MD5

      20b91dcb9ffeb801f0326e285af793b6

    • SHA1

      bb0ba64c20c5ece43ef747dd8fafb18a2175e1be

    • SHA256

      95d12290ef06bb6439efd6380fd60039c86d0329d6d23422fdc1b50189c82f7d

    • SHA512

      99bcb2422c0473f8d55e1fc27f03b73cf4749b247d741d44cd4b3677d17c8fa767c8e28d43d5386151b1cb36ebaa279833574117d978c6f5404dbeb2e30cc094

    • SSDEEP

      98304:R7G7INU2nn+TxiWgxNc5syFmNwXvCFXm97JN4:N75nYiW8gQNwXvk2i

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks