General
-
Target
e740bc29ad41dff6c45ff689afa65744_JaffaCakes118
-
Size
1.3MB
-
Sample
240917-t524bstamd
-
MD5
e740bc29ad41dff6c45ff689afa65744
-
SHA1
bfe58e078729446312f62b1174c0ee2c1d88e7f8
-
SHA256
34b3617ea68e33b7504c30e00c0482c3da40b916f5b801027ea4923c86baee06
-
SHA512
de87b1e58c7a430838ddd5a34e610a32631176660b7e169e640912c921bf789f5ef2a843329fd82d210a847e1fc47749a71747626de2130c9d8b758a3b841a3a
-
SSDEEP
24576:SEk3cJEBCIXEIUP/dKAyoxjBg/U+9gzxJ2hGU5PG3oCwNxl99BA2b6a:Pk3cJ66PIDqAUKKxJ2hNDCOpT6a
Static task
static1
Behavioral task
behavioral1
Sample
e740bc29ad41dff6c45ff689afa65744_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e740bc29ad41dff6c45ff689afa65744_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
e740bc29ad41dff6c45ff689afa65744_JaffaCakes118
-
Size
1.3MB
-
MD5
e740bc29ad41dff6c45ff689afa65744
-
SHA1
bfe58e078729446312f62b1174c0ee2c1d88e7f8
-
SHA256
34b3617ea68e33b7504c30e00c0482c3da40b916f5b801027ea4923c86baee06
-
SHA512
de87b1e58c7a430838ddd5a34e610a32631176660b7e169e640912c921bf789f5ef2a843329fd82d210a847e1fc47749a71747626de2130c9d8b758a3b841a3a
-
SSDEEP
24576:SEk3cJEBCIXEIUP/dKAyoxjBg/U+9gzxJ2hGU5PG3oCwNxl99BA2b6a:Pk3cJ66PIDqAUKKxJ2hNDCOpT6a
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
ModiLoader Second Stage
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Virtualization/Sandbox Evasion
2