General
-
Target
16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118
-
Size
186KB
-
Sample
241005-d4wxxsxdmh
-
MD5
16006fc004311e4f0e2998b79aef3b8b
-
SHA1
01c4bac22fed4ec60fe07c964d77e4a29fe50bd8
-
SHA256
58524944709f5765b585b156f9d533b822ded799461fc72285785088f3b8fe8b
-
SHA512
7daa7043475710a1791177d05bbbfe4922718df022bd8cf98e4708bcc17fdc39f42aeca82ec070ba196fa6c3f8e7eba6d924853e0d6b8a4a183260dde864c835
-
SSDEEP
3072:woy8j7VnNdrPHaSekwi+mW+2JUoZsZloutnaWo6eSEcfNte4lyArDcoWwVK:g8jZ7rvaU3+mWrnZWloSnaWld11Q4lVG
Behavioral task
behavioral1
Sample
16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Extracted
latentbot
lacamora1997.zapto.org
Targets
-
-
Target
16006fc004311e4f0e2998b79aef3b8b_JaffaCakes118
-
Size
186KB
-
MD5
16006fc004311e4f0e2998b79aef3b8b
-
SHA1
01c4bac22fed4ec60fe07c964d77e4a29fe50bd8
-
SHA256
58524944709f5765b585b156f9d533b822ded799461fc72285785088f3b8fe8b
-
SHA512
7daa7043475710a1791177d05bbbfe4922718df022bd8cf98e4708bcc17fdc39f42aeca82ec070ba196fa6c3f8e7eba6d924853e0d6b8a4a183260dde864c835
-
SSDEEP
3072:woy8j7VnNdrPHaSekwi+mW+2JUoZsZloutnaWo6eSEcfNte4lyArDcoWwVK:g8jZ7rvaU3+mWrnZWloSnaWld11Q4lVG
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies firewall policy service
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6