General
-
Target
59fb67ea0ea32f96acc3b0487f3fa0b7_JaffaCakes118
-
Size
345KB
-
Sample
240519-petbaagg5v
-
MD5
59fb67ea0ea32f96acc3b0487f3fa0b7
-
SHA1
b58cceda89db13e73dc7a7b8d11bc5cc53359094
-
SHA256
e042a76361ec86ae101e9c338fb6165945a9550febf6eaebe6d40ccdee6a146e
-
SHA512
dc5b34422ad1ac73c475bda56fabc991b82db799df6024f7009fbd4e89c731d33bfd8c49900136f9c41d091b70fe5addebed62fda265b708291a05dd8c467128
-
SSDEEP
6144:pQUfThSSa/BpPEsOPDXBD/TlfGtk3wfCGovFpOmx+M59OTU4Q+IH/AXYO0Ip+u5F:O6FIBpPxuXBXREk3wfCGqwW+8O44gfA7
Static task
static1
Behavioral task
behavioral1
Sample
59fb67ea0ea32f96acc3b0487f3fa0b7_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
59fb67ea0ea32f96acc3b0487f3fa0b7_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
59fb67ea0ea32f96acc3b0487f3fa0b7_JaffaCakes118
-
Size
345KB
-
MD5
59fb67ea0ea32f96acc3b0487f3fa0b7
-
SHA1
b58cceda89db13e73dc7a7b8d11bc5cc53359094
-
SHA256
e042a76361ec86ae101e9c338fb6165945a9550febf6eaebe6d40ccdee6a146e
-
SHA512
dc5b34422ad1ac73c475bda56fabc991b82db799df6024f7009fbd4e89c731d33bfd8c49900136f9c41d091b70fe5addebed62fda265b708291a05dd8c467128
-
SSDEEP
6144:pQUfThSSa/BpPEsOPDXBD/TlfGtk3wfCGovFpOmx+M59OTU4Q+IH/AXYO0Ip+u5F:O6FIBpPxuXBXREk3wfCGqwW+8O44gfA7
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VirtualBox drivers on disk
-
ModiLoader Second Stage
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1