General

  • Target

    d2bad7e18116e791320d2eb8a2fcfedf_JaffaCakes118

  • Size

    896KB

  • Sample

    240907-yrw3davbqe

  • MD5

    d2bad7e18116e791320d2eb8a2fcfedf

  • SHA1

    2acb59b67f57a4df31a513fc93eed42e841d57d8

  • SHA256

    d897b5b5b3f72f1bce5954b152c917ac5574dd33ba57e5e65ecedaefd695e19f

  • SHA512

    05a544073dd4169376feaca652667ce30e6eed594f3327d9d56fa678aae58fdaec179fbbe92683fa2b34212ade85e32be80fecad8fb726b0c5908ea06b72cc99

  • SSDEEP

    12288:Yxo7YNQg2YcKify3iTntxrr0cuUPnIpVwDIX9cgtWb2pExgDj48uSeJro8k/2Dyk:YKwQrsiK3Sr0ckHCb2Gxg348uS8o4

Malware Config

Targets

    • Target

      d2bad7e18116e791320d2eb8a2fcfedf_JaffaCakes118

    • Size

      896KB

    • MD5

      d2bad7e18116e791320d2eb8a2fcfedf

    • SHA1

      2acb59b67f57a4df31a513fc93eed42e841d57d8

    • SHA256

      d897b5b5b3f72f1bce5954b152c917ac5574dd33ba57e5e65ecedaefd695e19f

    • SHA512

      05a544073dd4169376feaca652667ce30e6eed594f3327d9d56fa678aae58fdaec179fbbe92683fa2b34212ade85e32be80fecad8fb726b0c5908ea06b72cc99

    • SSDEEP

      12288:Yxo7YNQg2YcKify3iTntxrr0cuUPnIpVwDIX9cgtWb2pExgDj48uSeJro8k/2Dyk:YKwQrsiK3Sr0ckHCb2Gxg348uS8o4

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks