General

  • Target

    7e009d25176572881fa9322dc4f075c7_JaffaCakes118

  • Size

    312KB

  • Sample

    240528-xfz48afg5z

  • MD5

    7e009d25176572881fa9322dc4f075c7

  • SHA1

    d0b17a0cab2fd44480fd782e62528d518a41e2a5

  • SHA256

    5ebf5e0cf9a91d48b42971790f2f5841585429604fa78b6ed9a9a3d0b4c5acd0

  • SHA512

    c066e0f1b11200d7c31ce6648638d237ea8adecf3964d2ad4f984807973073ffa3bc02a96566f36b85e765d48820ee516da936fb16acf7e9099fd1a957c3dc64

  • SSDEEP

    6144:l1wWsAmf6Uj3Bav0xUzgSwnEaY3+2/Pv3yhTRSbiWI3Uu7DTOogVe:0VAbMccGcSwnjQ7HAIBI3tD6le

Malware Config

Targets

    • Target

      7e009d25176572881fa9322dc4f075c7_JaffaCakes118

    • Size

      312KB

    • MD5

      7e009d25176572881fa9322dc4f075c7

    • SHA1

      d0b17a0cab2fd44480fd782e62528d518a41e2a5

    • SHA256

      5ebf5e0cf9a91d48b42971790f2f5841585429604fa78b6ed9a9a3d0b4c5acd0

    • SHA512

      c066e0f1b11200d7c31ce6648638d237ea8adecf3964d2ad4f984807973073ffa3bc02a96566f36b85e765d48820ee516da936fb16acf7e9099fd1a957c3dc64

    • SSDEEP

      6144:l1wWsAmf6Uj3Bav0xUzgSwnEaY3+2/Pv3yhTRSbiWI3Uu7DTOogVe:0VAbMccGcSwnjQ7HAIBI3tD6le

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VirtualBox drivers on disk

    • ModiLoader Second Stage

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Drops startup file

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks