General
-
Target
890c6288af1b4e9d66963d946968ce4c_JaffaCakes118
-
Size
1.3MB
-
Sample
240811-fep47awbkp
-
MD5
890c6288af1b4e9d66963d946968ce4c
-
SHA1
a698881adc4d9e2012e9707b556519bba1908ea5
-
SHA256
a8c548d911b046423496e93dde158ddb08dee59490e135b0940ae22ce6934ace
-
SHA512
3f576af65967794e834f4e134ed480f657acf722d5604392cdbbac6ba2185a76a48a91701e723ea310c2cfef5531e319c03083364e0995a42378ee3b84326357
-
SSDEEP
24576:rHF6WSP0E+yrUz0ZpAv9Yxx4d/vPQ2HoIpeeksCHfMWiM61ZcDip:rwWo0SUzkqv9Y4dIuLI2y61Zj
Static task
static1
Behavioral task
behavioral1
Sample
890c6288af1b4e9d66963d946968ce4c_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
890c6288af1b4e9d66963d946968ce4c_JaffaCakes118
-
Size
1.3MB
-
MD5
890c6288af1b4e9d66963d946968ce4c
-
SHA1
a698881adc4d9e2012e9707b556519bba1908ea5
-
SHA256
a8c548d911b046423496e93dde158ddb08dee59490e135b0940ae22ce6934ace
-
SHA512
3f576af65967794e834f4e134ed480f657acf722d5604392cdbbac6ba2185a76a48a91701e723ea310c2cfef5531e319c03083364e0995a42378ee3b84326357
-
SSDEEP
24576:rHF6WSP0E+yrUz0ZpAv9Yxx4d/vPQ2HoIpeeksCHfMWiM61ZcDip:rwWo0SUzkqv9Y4dIuLI2y61Zj
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies firewall policy service
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5