General

  • Target

    1cb03938e065d1924e78ecc1e8552ea5_JaffaCakes118

  • Size

    204KB

  • Sample

    240701-149kcaxajk

  • MD5

    1cb03938e065d1924e78ecc1e8552ea5

  • SHA1

    5a4db32f51e9d9c87c5d49d6c198f898c9d001b7

  • SHA256

    480add5ca2996d3f6c4d2f1b469c0bcf79ee90fae89d74bef0fdb10e795c39f3

  • SHA512

    389dc7aa252a22dd552e9166e05cdd91be07b2b63f43729e5ecfd4d7e494bfdb4bb709deaa460be4b60b870e91a880b9970652737c004d366e39d9b75839067f

  • SSDEEP

    6144:jkUCrMOsHvX8wvP6bQ7yMP+DE827ufWlv+/:IUC9sPd6b7MP+Dd2+4U

Malware Config

Extracted

Family

metasploit

Version

encoder/fnstenv_mov

Targets

    • Target

      1cb03938e065d1924e78ecc1e8552ea5_JaffaCakes118

    • Size

      204KB

    • MD5

      1cb03938e065d1924e78ecc1e8552ea5

    • SHA1

      5a4db32f51e9d9c87c5d49d6c198f898c9d001b7

    • SHA256

      480add5ca2996d3f6c4d2f1b469c0bcf79ee90fae89d74bef0fdb10e795c39f3

    • SHA512

      389dc7aa252a22dd552e9166e05cdd91be07b2b63f43729e5ecfd4d7e494bfdb4bb709deaa460be4b60b870e91a880b9970652737c004d366e39d9b75839067f

    • SSDEEP

      6144:jkUCrMOsHvX8wvP6bQ7yMP+DE827ufWlv+/:IUC9sPd6b7MP+Dd2+4U

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Modifies security service

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

1
T1112

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Tasks