General

  • Target

    f2460f015becab932d6c76a2ddd03b38_JaffaCakes118

  • Size

    587KB

  • Sample

    240922-sm9j1swcnr

  • MD5

    f2460f015becab932d6c76a2ddd03b38

  • SHA1

    26e9ed475a6e9481f0bf733f9890917a361aa436

  • SHA256

    ad2a5731163d075ec2fe2f6720fc323ee8a5e77c621932be6ae46b42f105faa7

  • SHA512

    5663b29af3843a734331ff4179cc46ea4be6cd3eea82bb7d69bc67f7b836e8498e1799ff57396b3c1e7fad0a5e47145e93169984a48f510e8d2d9ce6896ca6bd

  • SSDEEP

    12288:GDgDbjFW90GkZTKwWk8SlNWpxYYmF5YjCD0cU5SBJwtFTT:WaVa9kZU2TPv5+CbUootFTT

Malware Config

Targets

    • Target

      f2460f015becab932d6c76a2ddd03b38_JaffaCakes118

    • Size

      587KB

    • MD5

      f2460f015becab932d6c76a2ddd03b38

    • SHA1

      26e9ed475a6e9481f0bf733f9890917a361aa436

    • SHA256

      ad2a5731163d075ec2fe2f6720fc323ee8a5e77c621932be6ae46b42f105faa7

    • SHA512

      5663b29af3843a734331ff4179cc46ea4be6cd3eea82bb7d69bc67f7b836e8498e1799ff57396b3c1e7fad0a5e47145e93169984a48f510e8d2d9ce6896ca6bd

    • SSDEEP

      12288:GDgDbjFW90GkZTKwWk8SlNWpxYYmF5YjCD0cU5SBJwtFTT:WaVa9kZU2TPv5+CbUootFTT

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VirtualBox drivers on disk

    • ModiLoader Second Stage

    • Adds policy Run key to start application

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks