General

  • Target

    ccb09b6e9134bab23f215fd2056ca347_JaffaCakes118

  • Size

    181KB

  • Sample

    241206-ncbssazrdp

  • MD5

    ccb09b6e9134bab23f215fd2056ca347

  • SHA1

    c1ea45bb46a24bd65312a45eb86ce982936fdcf3

  • SHA256

    4841145d3c19307932d092cf606fcada5d1c30c1ce7cddc4bc84fa60f79c8bd7

  • SHA512

    dd63da352d1f85662436a96645e9218cb82bc3db647dc1326a3006c7742800ce6130f7e2eff42777d89964bf1347f72787915df028835bd762dea1041d311f29

  • SSDEEP

    3072:8Z2xvc3PcSnZ1pPHA3v0goBIX0GLmCljv1RFfchDjCmJIEgsKW//4ly+Gh7Lel8M:9xU3P7Z1ZgcwXy+juhDDaEgsN//4SVLm

Malware Config

Targets

    • Target

      ccb09b6e9134bab23f215fd2056ca347_JaffaCakes118

    • Size

      181KB

    • MD5

      ccb09b6e9134bab23f215fd2056ca347

    • SHA1

      c1ea45bb46a24bd65312a45eb86ce982936fdcf3

    • SHA256

      4841145d3c19307932d092cf606fcada5d1c30c1ce7cddc4bc84fa60f79c8bd7

    • SHA512

      dd63da352d1f85662436a96645e9218cb82bc3db647dc1326a3006c7742800ce6130f7e2eff42777d89964bf1347f72787915df028835bd762dea1041d311f29

    • SSDEEP

      3072:8Z2xvc3PcSnZ1pPHA3v0goBIX0GLmCljv1RFfchDjCmJIEgsKW//4ly+Gh7Lel8M:9xU3P7Z1ZgcwXy+juhDDaEgsN//4SVLm

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks