General

  • Target

    245c4c4e6e1cc032d3c504264867202c_JaffaCakes118

  • Size

    395KB

  • Sample

    240508-l77slafc5y

  • MD5

    245c4c4e6e1cc032d3c504264867202c

  • SHA1

    f293f9d6a9102ab1e75418a44adb76f7fabb5758

  • SHA256

    84d4030515b6cef25d201b53a1f8df11635ca087b2f0ebd92a7cebbc9d5b4fe4

  • SHA512

    160130da3e49dc1bf95a3d509db5730602989043b907adfa5d4a2aec9e4bd48fd440e08ddb17874da52c663bdc12902a78a7fb437610f568179398572fe74a9f

  • SSDEEP

    6144:fweZD43kpFW+51Bhxc0ASZls2QTmUcukV2VDtYIHH89GyDfu07/nlgz:f54+5HxFl4Eug2ltrQDvxU

Malware Config

Targets

    • Target

      245c4c4e6e1cc032d3c504264867202c_JaffaCakes118

    • Size

      395KB

    • MD5

      245c4c4e6e1cc032d3c504264867202c

    • SHA1

      f293f9d6a9102ab1e75418a44adb76f7fabb5758

    • SHA256

      84d4030515b6cef25d201b53a1f8df11635ca087b2f0ebd92a7cebbc9d5b4fe4

    • SHA512

      160130da3e49dc1bf95a3d509db5730602989043b907adfa5d4a2aec9e4bd48fd440e08ddb17874da52c663bdc12902a78a7fb437610f568179398572fe74a9f

    • SSDEEP

      6144:fweZD43kpFW+51Bhxc0ASZls2QTmUcukV2VDtYIHH89GyDfu07/nlgz:f54+5HxFl4Eug2ltrQDvxU

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VirtualBox drivers on disk

    • ModiLoader Second Stage

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks