General
-
Target
9c4a59c1773d2c034428eb92d5139158_JaffaCakes118
-
Size
620KB
-
Sample
241125-slfwbayqel
-
MD5
9c4a59c1773d2c034428eb92d5139158
-
SHA1
bc771b531d2416e561451b0e73034565f892d05a
-
SHA256
dd03d7e8675a6e9288dc96e782ee1ca1810b5041ea3c5ac11a097235ba992393
-
SHA512
1ea33ed3132b4a8493722e1fd0e569a527e7adaa1d74d75215ea684220ef569fdac31e5ce9ceef8a6bc265f42d0ebb525b260e7c614610a7c783003b060b3124
-
SSDEEP
6144:NFgoSF7kUAD44sfpLyyRpmv4M2RkviUiXaGLVLrLjc0dFeIC8ixzD9:fgoSF79k44WjnTkqNXaGRLrLjc0pM
Static task
static1
Behavioral task
behavioral1
Sample
9c4a59c1773d2c034428eb92d5139158_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9c4a59c1773d2c034428eb92d5139158_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
9c4a59c1773d2c034428eb92d5139158_JaffaCakes118
-
Size
620KB
-
MD5
9c4a59c1773d2c034428eb92d5139158
-
SHA1
bc771b531d2416e561451b0e73034565f892d05a
-
SHA256
dd03d7e8675a6e9288dc96e782ee1ca1810b5041ea3c5ac11a097235ba992393
-
SHA512
1ea33ed3132b4a8493722e1fd0e569a527e7adaa1d74d75215ea684220ef569fdac31e5ce9ceef8a6bc265f42d0ebb525b260e7c614610a7c783003b060b3124
-
SSDEEP
6144:NFgoSF7kUAD44sfpLyyRpmv4M2RkviUiXaGLVLrLjc0dFeIC8ixzD9:fgoSF79k44WjnTkqNXaGRLrLjc0pM
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1