General
-
Target
fc857f195405b95292cba87d4d409fc3_JaffaCakes118
-
Size
660KB
-
Sample
240420-l73hwaef81
-
MD5
fc857f195405b95292cba87d4d409fc3
-
SHA1
fdfe0f27a558d2f92c3f83e58417bcde1f7e2d5b
-
SHA256
25af346b7e1978d9946b65a5fe77308791bdf91a1c83582a6b748775f6f51034
-
SHA512
62b9f6eca7b82e2194f16d5060515297c80c925cf83da94e3f51df504d0a693b00213fe419cf14187214470f7178007430722bf20fa2d021cfa9e4e4e2a74b00
-
SSDEEP
12288:lTqLtDbIOKkatQoKXpa00bDqlQbnRiTJwYf1cN2nN2JyO6:lwpNawXI00bDqlkA1gyP
Behavioral task
behavioral1
Sample
fc857f195405b95292cba87d4d409fc3_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fc857f195405b95292cba87d4d409fc3_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
fc857f195405b95292cba87d4d409fc3_JaffaCakes118
-
Size
660KB
-
MD5
fc857f195405b95292cba87d4d409fc3
-
SHA1
fdfe0f27a558d2f92c3f83e58417bcde1f7e2d5b
-
SHA256
25af346b7e1978d9946b65a5fe77308791bdf91a1c83582a6b748775f6f51034
-
SHA512
62b9f6eca7b82e2194f16d5060515297c80c925cf83da94e3f51df504d0a693b00213fe419cf14187214470f7178007430722bf20fa2d021cfa9e4e4e2a74b00
-
SSDEEP
12288:lTqLtDbIOKkatQoKXpa00bDqlQbnRiTJwYf1cN2nN2JyO6:lwpNawXI00bDqlkA1gyP
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies security service
-
Modifies visiblity of hidden/system files in Explorer
-
ModiLoader Second Stage
-
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
6