General

  • Target

    JaffaCakes118_e61e089f3848482a8e49076dcd58a5c74bba5695dd58041cb93df4a95ead5ac7

  • Size

    4.4MB

  • Sample

    241225-vaq81syngz

  • MD5

    dcd47145b999c5e0b6ab0b9866a91bb6

  • SHA1

    17780cda6d8994b066f51bbe8a0a71ed5b9b4841

  • SHA256

    e61e089f3848482a8e49076dcd58a5c74bba5695dd58041cb93df4a95ead5ac7

  • SHA512

    a56d7bd8e8ca80d9acb8ba63265c21d8b9647fce68ebd63026bf927a669b21e71062ba034601d80cdd5bc5333226c516a81f91a7e5bfb23b2bdf0e3fdf852ab9

  • SSDEEP

    98304:Rezoc1EJrWcgOFsmfMcrqcKg68+Cor1nsmZpu0jC5aSn:ReH1EJrdpMc2c/1at8a2

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      JaffaCakes118_e61e089f3848482a8e49076dcd58a5c74bba5695dd58041cb93df4a95ead5ac7

    • Size

      4.4MB

    • MD5

      dcd47145b999c5e0b6ab0b9866a91bb6

    • SHA1

      17780cda6d8994b066f51bbe8a0a71ed5b9b4841

    • SHA256

      e61e089f3848482a8e49076dcd58a5c74bba5695dd58041cb93df4a95ead5ac7

    • SHA512

      a56d7bd8e8ca80d9acb8ba63265c21d8b9647fce68ebd63026bf927a669b21e71062ba034601d80cdd5bc5333226c516a81f91a7e5bfb23b2bdf0e3fdf852ab9

    • SSDEEP

      98304:Rezoc1EJrWcgOFsmfMcrqcKg68+Cor1nsmZpu0jC5aSn:ReH1EJrdpMc2c/1at8a2

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks