General

  • Target

    JaffaCakes118_de93e4a28d83a6d7f4362b2a5261c6f7453dd3d6a9683da1d9fd6ec4d9a55733

  • Size

    4.3MB

  • Sample

    241229-3x3vbs1ldl

  • MD5

    ff7b4d2dbd02e9b1eb295e5fc63009b5

  • SHA1

    a9a674313f6bdb7c2a516e09ccc1d57b91584148

  • SHA256

    de93e4a28d83a6d7f4362b2a5261c6f7453dd3d6a9683da1d9fd6ec4d9a55733

  • SHA512

    79acdc4bb9904292439e8c5833df3455f07c18ee8daed42b66927b89ab50d8f1aba9c1497bb6009dc6bed7125c482041a40ad43e2544e5ff8137afdcb8633297

  • SSDEEP

    98304:lRt0VN4WMIcLUV+itn+jyremsCbx5bkPJBuXpcPF/rl9N7Uv5:lD0VfLZ+iB+jyrvgPCpcPhl0B

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      JaffaCakes118_de93e4a28d83a6d7f4362b2a5261c6f7453dd3d6a9683da1d9fd6ec4d9a55733

    • Size

      4.3MB

    • MD5

      ff7b4d2dbd02e9b1eb295e5fc63009b5

    • SHA1

      a9a674313f6bdb7c2a516e09ccc1d57b91584148

    • SHA256

      de93e4a28d83a6d7f4362b2a5261c6f7453dd3d6a9683da1d9fd6ec4d9a55733

    • SHA512

      79acdc4bb9904292439e8c5833df3455f07c18ee8daed42b66927b89ab50d8f1aba9c1497bb6009dc6bed7125c482041a40ad43e2544e5ff8137afdcb8633297

    • SSDEEP

      98304:lRt0VN4WMIcLUV+itn+jyremsCbx5bkPJBuXpcPF/rl9N7Uv5:lD0VfLZ+iB+jyrvgPCpcPhl0B

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks