Overview
overview
10Static
static
39e20a516f7...18.exe
windows7-x64
109e20a516f7...18.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3contact.html
windows7-x64
3contact.html
windows10-2004-x64
3privacy_policy.html
windows7-x64
3privacy_policy.html
windows10-2004-x64
3uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7General
-
Target
9e20a516f7cc4eaecffcc0808b50fb64_JaffaCakes118
-
Size
314KB
-
Sample
241125-1wth6aylbv
-
MD5
9e20a516f7cc4eaecffcc0808b50fb64
-
SHA1
1681838951cffa50dbb5c61bb686ecc424b24a94
-
SHA256
03d596c4e2ec8536abb673e0629fc31d4c5df8863f378a1372546cd8cae7caf8
-
SHA512
c0a5d56faa997cca2536031e0a1ce56ac0b9bb926b8e65f7e2209097453845058249e515f9a9d89fc873173af22bb916382cb3516317efea4d253cfd7a5a2776
-
SSDEEP
6144:TB+pgUmaidOrFsPlz67WoiAoMYC/yc2MbsLQcSQj2qzZyc76K:TgOaoyuPlzo3i7/QyfI+QRc7X
Static task
static1
Behavioral task
behavioral1
Sample
9e20a516f7cc4eaecffcc0808b50fb64_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9e20a516f7cc4eaecffcc0808b50fb64_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
contact.html
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
contact.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
privacy_policy.html
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
privacy_policy.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
uninstall.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
uninstall.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
9e20a516f7cc4eaecffcc0808b50fb64_JaffaCakes118
-
Size
314KB
-
MD5
9e20a516f7cc4eaecffcc0808b50fb64
-
SHA1
1681838951cffa50dbb5c61bb686ecc424b24a94
-
SHA256
03d596c4e2ec8536abb673e0629fc31d4c5df8863f378a1372546cd8cae7caf8
-
SHA512
c0a5d56faa997cca2536031e0a1ce56ac0b9bb926b8e65f7e2209097453845058249e515f9a9d89fc873173af22bb916382cb3516317efea4d253cfd7a5a2776
-
SSDEEP
6144:TB+pgUmaidOrFsPlz67WoiAoMYC/yc2MbsLQcSQj2qzZyc76K:TgOaoyuPlzo3i7/QyfI+QRc7X
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VirtualBox drivers on disk
-
ModiLoader Second Stage
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/InstallOptions.dll
-
Size
15KB
-
MD5
5b3edb39fe9c026322caf37ea10f6733
-
SHA1
3caf8b5b38feb87bfeb0e01e59d4e36f110c9e9e
-
SHA256
a96b1c95f51b088ed5ec476485a6aa562cbe68a88d0261ce88bcb3dca1f1c8b0
-
SHA512
7930e12c72744c9cf5e2f9b93236526289ed3f9773b92c865228ad33ab45d64e73ee5604a74e49630e066d802a5ca4602d4b986131d267ce17a8ce5d3b5f054c
-
SSDEEP
384:EfC43tPegZ3eBaRwCPOYY7nNYXC7/Yosa:EKTgZ3eBTCmrnNAh
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
a4dd044bcd94e9b3370ccf095b31f896
-
SHA1
17c78201323ab2095bc53184aa8267c9187d5173
-
SHA256
2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
-
SHA512
87335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a
-
SSDEEP
192:em24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlESl:m8QIl975eXqlWBrz7YLOlE
Score3/10 -
-
-
Target
contact.php
-
Size
319B
-
MD5
48b7875eddf3913382a3c299e84a27f1
-
SHA1
6a05bcea4829a70ce0e1c105d0568ac5031d3e89
-
SHA256
88332868551ed40475c1d8b88613910b60773ccb5760083b2037c55a21c002f5
-
SHA512
d5b3a2f141d07242f9b6fdb71d77b821df76edb9677a2992ddfd16f242afc9df12ce5ae0dbd4c029d1c9dd7dc92b4069467c0ee4816c61e1693c46a8857d4a04
Score3/10 -
-
-
Target
privacy_policy.php
-
Size
3KB
-
MD5
dab2f129c75c2369479d341a4f754e52
-
SHA1
b88958b6379579bd380661ed83625114a41c1a5b
-
SHA256
136ac48f0f2c86d9ba706455349703f76b9097271e8c61c94efa00a882ffc985
-
SHA512
63058fd68daf8f02b4e0d7dea32ce8fb9fd456188878ebbe626bc354a394a8ca16f7aec2617d585e6e799801058775c29c6c08891fa77b05de857d409762e87e
Score3/10 -
-
-
Target
uninstall.exe
-
Size
53KB
-
MD5
8ac175edf71a4fa85c1b63e7767475ac
-
SHA1
cd3ad22fa01af49731bde4092eba295a03fe545d
-
SHA256
7a3a438b9d9966a29766c5b2680af99840a440682b1ce97650f8e056e1622689
-
SHA512
c8971ce82da2c5caf1282c8620d294864f64e1cf91cd91aeea3cd1d94ff62cd949af7cddc8478d88da3be2a3455a85baee2b20de219e614d2dbaf875e3b9296b
-
SSDEEP
1536:oMaAWOz2YOFw3ae4ptaq5qHSlTBu5gdLeAyN0h9ws:oAe+3aJpgWXTBu5ceA3ws
Score7/10-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Discovery
Browser Information Discovery
1File and Directory Discovery
1Peripheral Device Discovery
1Query Registry
6Software Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1Virtualization/Sandbox Evasion
3