General
-
Target
224054c64536599cfd84b01b8da90e70_JaffaCakes118
-
Size
2.4MB
-
Sample
240703-nrvt7s1bkf
-
MD5
224054c64536599cfd84b01b8da90e70
-
SHA1
5568181e8a6459fadf6657d6fc9198e0ef82269c
-
SHA256
5c7eebdc6047898af1da70d12326153541d84ebb4b15e9f75d4fb2cd70a30a9f
-
SHA512
bdf80d39a2fa3c65b2f48707b35c87f84badfda2b440abfa1d9ed6c74159d5e633e0861eb4907884b71b0878b67e30c1e16c22c35e65b4a5ba343950ce7891cb
-
SSDEEP
49152:R/HkINdk626jhO50dEiRnXv8b/vXM2Ldll9nV8VJUtGCZzHZOjO:R/HDkd6k0dlRf8b/vc2LLl9eVIGYDZOi
Static task
static1
Behavioral task
behavioral1
Sample
224054c64536599cfd84b01b8da90e70_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
224054c64536599cfd84b01b8da90e70_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
myofficelog - Password:
741852
Targets
-
-
Target
224054c64536599cfd84b01b8da90e70_JaffaCakes118
-
Size
2.4MB
-
MD5
224054c64536599cfd84b01b8da90e70
-
SHA1
5568181e8a6459fadf6657d6fc9198e0ef82269c
-
SHA256
5c7eebdc6047898af1da70d12326153541d84ebb4b15e9f75d4fb2cd70a30a9f
-
SHA512
bdf80d39a2fa3c65b2f48707b35c87f84badfda2b440abfa1d9ed6c74159d5e633e0861eb4907884b71b0878b67e30c1e16c22c35e65b4a5ba343950ce7891cb
-
SSDEEP
49152:R/HkINdk626jhO50dEiRnXv8b/vXM2Ldll9nV8VJUtGCZzHZOjO:R/HDkd6k0dlRf8b/vc2LLl9eVIGYDZOi
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Adds policy Run key to start application
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2