General

  • Target

    JaffaCakes118_61fa756410e9d4fbfdf67f8c88b1f77acdc185cfad52db55dc4016def100469c

  • Size

    4.3MB

  • Sample

    241229-l4vc4aypd1

  • MD5

    2d9a4935d4f9561ec5bbf73d776a2778

  • SHA1

    61e3e10065fbd4ff182062e13325886a1caf0559

  • SHA256

    61fa756410e9d4fbfdf67f8c88b1f77acdc185cfad52db55dc4016def100469c

  • SHA512

    4ff58a77c90a8481966ab5e3d18f0efaa0f30040b04647ac9b97b6b4dc4558828b58c935bb1f1d57e96f830da3b63677c62ccf4bef3a6c2793483549e45cfa18

  • SSDEEP

    98304:aM7Pv7+UY+73SpmsB6ud/S/LKh7Iy/jMWdMF4aHC9E8/PW:aOPvmCMQudK/LwMuFdM9QW

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      JaffaCakes118_61fa756410e9d4fbfdf67f8c88b1f77acdc185cfad52db55dc4016def100469c

    • Size

      4.3MB

    • MD5

      2d9a4935d4f9561ec5bbf73d776a2778

    • SHA1

      61e3e10065fbd4ff182062e13325886a1caf0559

    • SHA256

      61fa756410e9d4fbfdf67f8c88b1f77acdc185cfad52db55dc4016def100469c

    • SHA512

      4ff58a77c90a8481966ab5e3d18f0efaa0f30040b04647ac9b97b6b4dc4558828b58c935bb1f1d57e96f830da3b63677c62ccf4bef3a6c2793483549e45cfa18

    • SSDEEP

      98304:aM7Pv7+UY+73SpmsB6ud/S/LKh7Iy/jMWdMF4aHC9E8/PW:aOPvmCMQudK/LwMuFdM9QW

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks