General

  • Target

    JaffaCakes118_9d6e8369dc1e4df546c4e5295787e234dcbe2be1ea10d8842d0dd5c2d0be4fba

  • Size

    4.3MB

  • Sample

    241225-gvqw4azkgv

  • MD5

    0e8812eb07d4005e8e6cae77feb28fdb

  • SHA1

    349db6c34e777034b23f171db3bdd486d44a3e57

  • SHA256

    9d6e8369dc1e4df546c4e5295787e234dcbe2be1ea10d8842d0dd5c2d0be4fba

  • SHA512

    868d76f5a9e26986de922bbef6277a3e0017be28baa12ec969f2c523b212532d38db9f2d82548c3f6fa19207fc7b7db1dbd83d9cb42d9e3c7c84f9514fed355b

  • SSDEEP

    98304:4U2a1KukVdkTwLWw+oztSxt4oJzMDN/Wddki4tHBhX+EC8g7:4ykVdkTwqjozMUouDti4hhXvC8g7

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      JaffaCakes118_9d6e8369dc1e4df546c4e5295787e234dcbe2be1ea10d8842d0dd5c2d0be4fba

    • Size

      4.3MB

    • MD5

      0e8812eb07d4005e8e6cae77feb28fdb

    • SHA1

      349db6c34e777034b23f171db3bdd486d44a3e57

    • SHA256

      9d6e8369dc1e4df546c4e5295787e234dcbe2be1ea10d8842d0dd5c2d0be4fba

    • SHA512

      868d76f5a9e26986de922bbef6277a3e0017be28baa12ec969f2c523b212532d38db9f2d82548c3f6fa19207fc7b7db1dbd83d9cb42d9e3c7c84f9514fed355b

    • SSDEEP

      98304:4U2a1KukVdkTwLWw+oztSxt4oJzMDN/Wddki4tHBhX+EC8g7:4ykVdkTwqjozMUouDti4hhXvC8g7

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks