General
-
Target
f7772238dba163f9bc66ea6681b8a1ac_JaffaCakes118
-
Size
934KB
-
Sample
240926-d2p2layalc
-
MD5
f7772238dba163f9bc66ea6681b8a1ac
-
SHA1
a8d2a4a4ec75ac47d139a2a465e54a4d240808fd
-
SHA256
fbc9717210006babbafdcb94e7dd296f78916d6d722631f5a7f57827b8f670db
-
SHA512
2844cc48d3fdb6bafc2ea11f6e343c85a4234ce2359c84f0d557f4450967c38101f8a28e745d8d1a9a63e3d3b143b35b001a4358df8a49cab2d27d39291f8537
-
SSDEEP
24576:7rKhHcy0zong9j+G55ALg7b2vtrX+9ajMqjDf7yndTAJAUr:7rKhP0zAeRkZu93weT5Ur
Static task
static1
Behavioral task
behavioral1
Sample
f7772238dba163f9bc66ea6681b8a1ac_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f7772238dba163f9bc66ea6681b8a1ac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
f7772238dba163f9bc66ea6681b8a1ac_JaffaCakes118
-
Size
934KB
-
MD5
f7772238dba163f9bc66ea6681b8a1ac
-
SHA1
a8d2a4a4ec75ac47d139a2a465e54a4d240808fd
-
SHA256
fbc9717210006babbafdcb94e7dd296f78916d6d722631f5a7f57827b8f670db
-
SHA512
2844cc48d3fdb6bafc2ea11f6e343c85a4234ce2359c84f0d557f4450967c38101f8a28e745d8d1a9a63e3d3b143b35b001a4358df8a49cab2d27d39291f8537
-
SSDEEP
24576:7rKhHcy0zong9j+G55ALg7b2vtrX+9ajMqjDf7yndTAJAUr:7rKhP0zAeRkZu93weT5Ur
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Virtualization/Sandbox Evasion
2