General
-
Target
baa2c795c2072c9b1b8c7a96c98c62d3_JaffaCakes118
-
Size
200KB
-
Sample
241202-26mc9stmgk
-
MD5
baa2c795c2072c9b1b8c7a96c98c62d3
-
SHA1
641df1acbf84c469f3303178725609af2dff3bfb
-
SHA256
ed82187baa1260c87264ebdaaa6f32eb7494921079e134eb62b98ea80ab5e51b
-
SHA512
b00eaac49685c3f1a83b868d3a9ac45d0a5115394c1f963a4b17eb888cf2e74891d5891b4b7883e68745d2b1768733e456ce9994ada5bea880651fbeb26d9d3d
-
SSDEEP
3072:hzQxqdO8nnaXcEEGZJGO2KiCGFaJty7bEO+064P319opUEQrc59fYzbYgX59gYF2:2sdpnnucEHc31jEQuQzbHX52Y
Behavioral task
behavioral1
Sample
baa2c795c2072c9b1b8c7a96c98c62d3_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
baa2c795c2072c9b1b8c7a96c98c62d3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
baa2c795c2072c9b1b8c7a96c98c62d3_JaffaCakes118
-
Size
200KB
-
MD5
baa2c795c2072c9b1b8c7a96c98c62d3
-
SHA1
641df1acbf84c469f3303178725609af2dff3bfb
-
SHA256
ed82187baa1260c87264ebdaaa6f32eb7494921079e134eb62b98ea80ab5e51b
-
SHA512
b00eaac49685c3f1a83b868d3a9ac45d0a5115394c1f963a4b17eb888cf2e74891d5891b4b7883e68745d2b1768733e456ce9994ada5bea880651fbeb26d9d3d
-
SSDEEP
3072:hzQxqdO8nnaXcEEGZJGO2KiCGFaJty7bEO+064P319opUEQrc59fYzbYgX59gYF2:2sdpnnucEHc31jEQuQzbHX52Y
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Sality family
-
ModiLoader Second Stage
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5