General

  • Target

    JaffaCakes118_fe15c7a786bbc7dd035977a3afacc28904b4117fb2a2fdabb04ec2472f4244a4

  • Size

    4.3MB

  • Sample

    241230-1v63vs1jaj

  • MD5

    8df6f0eff101d6cd1a218fa4b4330072

  • SHA1

    1a5e52f79dceb4965374b7298a66cb52a19ace55

  • SHA256

    fe15c7a786bbc7dd035977a3afacc28904b4117fb2a2fdabb04ec2472f4244a4

  • SHA512

    9fae3c157a2a9b4ae91188da6b3851e46026d7d0dee08879e5d43458456abe74a090c1c329df7b7be8b829bcbba1a4acdf5e1bf92ecfcb2237ddf7759aeb8781

  • SSDEEP

    98304:lLUu7W1sWIBlhv9HbCDITSlvF/QCVFCVfwTY+uoSx5mKHg:lgzmWIdv9HbioSNF/TMfEJuoUHg

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Targets

    • Target

      JaffaCakes118_fe15c7a786bbc7dd035977a3afacc28904b4117fb2a2fdabb04ec2472f4244a4

    • Size

      4.3MB

    • MD5

      8df6f0eff101d6cd1a218fa4b4330072

    • SHA1

      1a5e52f79dceb4965374b7298a66cb52a19ace55

    • SHA256

      fe15c7a786bbc7dd035977a3afacc28904b4117fb2a2fdabb04ec2472f4244a4

    • SHA512

      9fae3c157a2a9b4ae91188da6b3851e46026d7d0dee08879e5d43458456abe74a090c1c329df7b7be8b829bcbba1a4acdf5e1bf92ecfcb2237ddf7759aeb8781

    • SSDEEP

      98304:lLUu7W1sWIBlhv9HbCDITSlvF/QCVFCVfwTY+uoSx5mKHg:lgzmWIdv9HbioSNF/TMfEJuoUHg

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba family

    • Glupteba payload

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Metasploit family

    • Windows security bypass

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Manipulates WinMon driver.

      Roottkits write to WinMon to hide PIDs from being detected.

    • Manipulates WinMonFS driver.

      Roottkits write to WinMonFS to hide directories/files from being detected.

MITRE ATT&CK Enterprise v15

Tasks