General

  • Target

    f56bc2805b3718860fcb83824340a454_JaffaCakes118

  • Size

    846KB

  • Sample

    240925-hg1ptatdrf

  • MD5

    f56bc2805b3718860fcb83824340a454

  • SHA1

    22dd89a2bb6c712a1fab8df6ccef6a7b0e83792a

  • SHA256

    499074fbac5a05f63603e572cf4ad3db7f9935607c03e49cb3649a7dbe1b9974

  • SHA512

    59b9b2ff5d69b40665d3269dca642dc029e0b2fefde43a27e1a7aa2b3906cb61ebbc50a020b4ba0c76e67adb8e18bc56236a3c5f7a3f1861a0dcd4a82082675b

  • SSDEEP

    12288:/uM8rDkP6zYf6AkQ/TkIs8KCDdd5OCvuEpwuHOYNcmi0vEBhJJesgkl+5eu0:/0rAfF5kVsvOMJwINcMvcri0

Malware Config

Targets

    • Target

      f56bc2805b3718860fcb83824340a454_JaffaCakes118

    • Size

      846KB

    • MD5

      f56bc2805b3718860fcb83824340a454

    • SHA1

      22dd89a2bb6c712a1fab8df6ccef6a7b0e83792a

    • SHA256

      499074fbac5a05f63603e572cf4ad3db7f9935607c03e49cb3649a7dbe1b9974

    • SHA512

      59b9b2ff5d69b40665d3269dca642dc029e0b2fefde43a27e1a7aa2b3906cb61ebbc50a020b4ba0c76e67adb8e18bc56236a3c5f7a3f1861a0dcd4a82082675b

    • SSDEEP

      12288:/uM8rDkP6zYf6AkQ/TkIs8KCDdd5OCvuEpwuHOYNcmi0vEBhJJesgkl+5eu0:/0rAfF5kVsvOMJwINcMvcri0

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader Second Stage

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks