General
-
Target
82c59fc1fde7d89e4a6ef2cd4b6fa924_JaffaCakes118
-
Size
781KB
-
Sample
241031-m622dsykdm
-
MD5
82c59fc1fde7d89e4a6ef2cd4b6fa924
-
SHA1
7a836aff1631fadd5ff16dd360463b4cebd1a5d4
-
SHA256
e0bb8d96067183c5cb3663ffa25c1d6a38ada75b3184cedcc96ead8df9c923b2
-
SHA512
0e30a018e65442fb872128716dafbc7d84127bd69aa99d20d960829463ae103a23433f0827630fbb65343fdc4c65064d41ce29a8b226607543315e81840ce5f5
-
SSDEEP
12288:g/sRpeFov6a3DEh14L6LGuS3MdInW+K580qxX7CYw921Hd6DEXI0p/MXBnfeAGqm:g/+eWz33LMvdInk8LF+YGEoF3eqm
Static task
static1
Behavioral task
behavioral1
Sample
82c59fc1fde7d89e4a6ef2cd4b6fa924_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
82c59fc1fde7d89e4a6ef2cd4b6fa924_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
82c59fc1fde7d89e4a6ef2cd4b6fa924_JaffaCakes118
-
Size
781KB
-
MD5
82c59fc1fde7d89e4a6ef2cd4b6fa924
-
SHA1
7a836aff1631fadd5ff16dd360463b4cebd1a5d4
-
SHA256
e0bb8d96067183c5cb3663ffa25c1d6a38ada75b3184cedcc96ead8df9c923b2
-
SHA512
0e30a018e65442fb872128716dafbc7d84127bd69aa99d20d960829463ae103a23433f0827630fbb65343fdc4c65064d41ce29a8b226607543315e81840ce5f5
-
SSDEEP
12288:g/sRpeFov6a3DEh14L6LGuS3MdInW+K580qxX7CYw921Hd6DEXI0p/MXBnfeAGqm:g/+eWz33LMvdInk8LF+YGEoF3eqm
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3