General

  • Target

    1f98f4990bbf6b268365ba7fdf56405f_JaffaCakes118

  • Size

    356KB

  • Sample

    240507-f5r2gaec47

  • MD5

    1f98f4990bbf6b268365ba7fdf56405f

  • SHA1

    e1f5a46baf14c6fdd67fcb1b3d37b54ad9a52317

  • SHA256

    5f2ebf4e711218b1c47e8c83cbe354a369efcfed3835c480c7ae08001dfbdb8f

  • SHA512

    bbf91e6a1a1c2a50f630d4ec347c7678647a78ce976af3db92b62498f77af84f506e1dadd4d9d8757c9f2297e80bbaf96e8575f5cb331800465417a6ed08717f

  • SSDEEP

    6144:Sae/c0RVIqxFu4s2a9XHCd9hxJamsAT4k+wCGbfQfojzMBR5h:W/cMVDxFu43cHYf1TPCAxjzMj

Malware Config

Targets

    • Target

      1f98f4990bbf6b268365ba7fdf56405f_JaffaCakes118

    • Size

      356KB

    • MD5

      1f98f4990bbf6b268365ba7fdf56405f

    • SHA1

      e1f5a46baf14c6fdd67fcb1b3d37b54ad9a52317

    • SHA256

      5f2ebf4e711218b1c47e8c83cbe354a369efcfed3835c480c7ae08001dfbdb8f

    • SHA512

      bbf91e6a1a1c2a50f630d4ec347c7678647a78ce976af3db92b62498f77af84f506e1dadd4d9d8757c9f2297e80bbaf96e8575f5cb331800465417a6ed08717f

    • SSDEEP

      6144:Sae/c0RVIqxFu4s2a9XHCd9hxJamsAT4k+wCGbfQfojzMBR5h:W/cMVDxFu43cHYf1TPCAxjzMj

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VirtualBox drivers on disk

    • ModiLoader Second Stage

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks