General

  • Target

    JaffaCakes118_72d81f6e9c69f91202d1f06ff63981733e49ae2eaf356da3e508b010919fdb93

  • Size

    4.3MB

  • Sample

    241229-ce9l2sypfj

  • MD5

    f12b74b5a8c3c8e26ec0d71f276c52e5

  • SHA1

    fed038842657d07eb2d787eadb5dbf322d57f613

  • SHA256

    72d81f6e9c69f91202d1f06ff63981733e49ae2eaf356da3e508b010919fdb93

  • SHA512

    07f4c719b21e029152bdfcf79cec1143eb3239956f495ed59e8150a2041a459628c53ef77f0e82c4d86d49e373125e2dc3fa4a4695624db17734a6779cfdb7e1

  • SSDEEP

    98304:GV3NCx2vLY75FnpuIMguOE19mZDcUEdT1zID:GV9CxztfhZuOm9mZwT16

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      JaffaCakes118_72d81f6e9c69f91202d1f06ff63981733e49ae2eaf356da3e508b010919fdb93

    • Size

      4.3MB

    • MD5

      f12b74b5a8c3c8e26ec0d71f276c52e5

    • SHA1

      fed038842657d07eb2d787eadb5dbf322d57f613

    • SHA256

      72d81f6e9c69f91202d1f06ff63981733e49ae2eaf356da3e508b010919fdb93

    • SHA512

      07f4c719b21e029152bdfcf79cec1143eb3239956f495ed59e8150a2041a459628c53ef77f0e82c4d86d49e373125e2dc3fa4a4695624db17734a6779cfdb7e1

    • SSDEEP

      98304:GV3NCx2vLY75FnpuIMguOE19mZDcUEdT1zID:GV9CxztfhZuOm9mZwT16

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks