General

  • Target

    ce4e528e9bb19603f805e79a0f329feb_JaffaCakes118

  • Size

    425KB

  • Sample

    241206-wlh78azlgx

  • MD5

    ce4e528e9bb19603f805e79a0f329feb

  • SHA1

    15f5c065cea10073eb730b68244247956144bdfd

  • SHA256

    4aee741a0b86dd6d89f06e840573792e2160dd5d998759ca1f9b438ba964b89c

  • SHA512

    c8f0b79f33ab31003ae950d027b146ab99007cc6871a15a0b04f6230c9b57275371fd061d8c2bd0acd7f3f0659f16f44ba1d34318f95ab7ff5afec1f98200718

  • SSDEEP

    6144:g2MjNWspjNHSkgPVXPJrnKPbLd0dlgHlt0sN2w6B/jj+tYvOf39:cUIVSdZhrnUbLKgFB0NS1ft

Malware Config

Targets

    • Target

      ce4e528e9bb19603f805e79a0f329feb_JaffaCakes118

    • Size

      425KB

    • MD5

      ce4e528e9bb19603f805e79a0f329feb

    • SHA1

      15f5c065cea10073eb730b68244247956144bdfd

    • SHA256

      4aee741a0b86dd6d89f06e840573792e2160dd5d998759ca1f9b438ba964b89c

    • SHA512

      c8f0b79f33ab31003ae950d027b146ab99007cc6871a15a0b04f6230c9b57275371fd061d8c2bd0acd7f3f0659f16f44ba1d34318f95ab7ff5afec1f98200718

    • SSDEEP

      6144:g2MjNWspjNHSkgPVXPJrnKPbLd0dlgHlt0sN2w6B/jj+tYvOf39:cUIVSdZhrnUbLKgFB0NS1ft

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks