General

  • Target

    d397e089ee9f0f752a5c13dfe4f2d143_JaffaCakes118

  • Size

    5.6MB

  • Sample

    241207-zvrgqsypap

  • MD5

    d397e089ee9f0f752a5c13dfe4f2d143

  • SHA1

    c3977823f7ccf638f63cdb390acb628fb4d6f9f6

  • SHA256

    c04ae2f8f7d73c30bf171ca8514774c78ab54f011be925b574ea3af5d45c9658

  • SHA512

    32c634360665f4f90953f84313fc4d8f8fe60e3a59c5eaa13c1a81b03b0114e26d3b8aa20757f3acb6a9bd6f952c5232557742aa7bcfad921e7f4386a001aea4

  • SSDEEP

    98304:MaC4+JOoJKFVlJvLrtg6NwO1+Dgm6nffxo2tQhye89NFS27CCySzX0Lp5tFb4w5q:N1oYVlltg7qbtQhyeINFS2b0lFJ

Malware Config

Targets

    • Target

      d397e089ee9f0f752a5c13dfe4f2d143_JaffaCakes118

    • Size

      5.6MB

    • MD5

      d397e089ee9f0f752a5c13dfe4f2d143

    • SHA1

      c3977823f7ccf638f63cdb390acb628fb4d6f9f6

    • SHA256

      c04ae2f8f7d73c30bf171ca8514774c78ab54f011be925b574ea3af5d45c9658

    • SHA512

      32c634360665f4f90953f84313fc4d8f8fe60e3a59c5eaa13c1a81b03b0114e26d3b8aa20757f3acb6a9bd6f952c5232557742aa7bcfad921e7f4386a001aea4

    • SSDEEP

      98304:MaC4+JOoJKFVlJvLrtg6NwO1+Dgm6nffxo2tQhye89NFS27CCySzX0Lp5tFb4w5q:N1oYVlltg7qbtQhyeINFS2b0lFJ

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modifies WinLogon for persistence

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks