General
-
Target
baee0f9bf421c883c45232169f34b452_JaffaCakes118
-
Size
125KB
-
Sample
240823-jxan1avglq
-
MD5
baee0f9bf421c883c45232169f34b452
-
SHA1
f87cf64ebadf9cea8b6ddb7c3fbb151a0b610902
-
SHA256
51ab52acf44fe469672a8bc675ca71d5121661e7c40018a5cd71abcdf36652d6
-
SHA512
319f00fdbda61c0525c646195ea177ccfb4442eb3bf7e60a9b9518cbf68770fa206756639aabc97e864e49b32d6e56915f631177ebc41878bf5ed78748bfd5b4
-
SSDEEP
3072:Y3JgVs2LveVDnjcaO5I0q35gXg8aXO72fkMzpFoZjV:6JgVz2nO5qpeaXSYGV
Static task
static1
Behavioral task
behavioral1
Sample
baee0f9bf421c883c45232169f34b452_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
baee0f9bf421c883c45232169f34b452_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
latentbot
ozaneryilmaz.zapto.org
Targets
-
-
Target
baee0f9bf421c883c45232169f34b452_JaffaCakes118
-
Size
125KB
-
MD5
baee0f9bf421c883c45232169f34b452
-
SHA1
f87cf64ebadf9cea8b6ddb7c3fbb151a0b610902
-
SHA256
51ab52acf44fe469672a8bc675ca71d5121661e7c40018a5cd71abcdf36652d6
-
SHA512
319f00fdbda61c0525c646195ea177ccfb4442eb3bf7e60a9b9518cbf68770fa206756639aabc97e864e49b32d6e56915f631177ebc41878bf5ed78748bfd5b4
-
SSDEEP
3072:Y3JgVs2LveVDnjcaO5I0q35gXg8aXO72fkMzpFoZjV:6JgVz2nO5qpeaXSYGV
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3