General

  • Target

    f3e6739855cd692814d03127ec47f6e5_JaffaCakes118

  • Size

    452KB

  • Sample

    240924-sd7ztszemr

  • MD5

    f3e6739855cd692814d03127ec47f6e5

  • SHA1

    cbc15c51bdec3c3cf2cfff1cddb48c94c0af6eb5

  • SHA256

    de22e8aba71d6ca43deca5d886cca789f7d2e621df87bf5a463c97789839ebf1

  • SHA512

    777b570dcb3b2daf95c5184a169e4cc13c1119bd8200aa5dbdb5841f83ce99f6170982d7290eac26dc474d27766a9fc3191fba8bf3e1f9435c911f42f1828358

  • SSDEEP

    12288:JalWPCZHBd3MyI29vZMGdckLRbz8PyArN6YM69jpjeedTO:JWWPCVB9MZ5GdckLRmys8R64oO

Malware Config

Targets

    • Target

      f3e6739855cd692814d03127ec47f6e5_JaffaCakes118

    • Size

      452KB

    • MD5

      f3e6739855cd692814d03127ec47f6e5

    • SHA1

      cbc15c51bdec3c3cf2cfff1cddb48c94c0af6eb5

    • SHA256

      de22e8aba71d6ca43deca5d886cca789f7d2e621df87bf5a463c97789839ebf1

    • SHA512

      777b570dcb3b2daf95c5184a169e4cc13c1119bd8200aa5dbdb5841f83ce99f6170982d7290eac26dc474d27766a9fc3191fba8bf3e1f9435c911f42f1828358

    • SSDEEP

      12288:JalWPCZHBd3MyI29vZMGdckLRbz8PyArN6YM69jpjeedTO:JWWPCVB9MZ5GdckLRmys8R64oO

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks