General
-
Target
d397e089ee9f0f752a5c13dfe4f2d143_JaffaCakes118
-
Size
5.6MB
-
Sample
241207-zvrgqsypap
-
MD5
d397e089ee9f0f752a5c13dfe4f2d143
-
SHA1
c3977823f7ccf638f63cdb390acb628fb4d6f9f6
-
SHA256
c04ae2f8f7d73c30bf171ca8514774c78ab54f011be925b574ea3af5d45c9658
-
SHA512
32c634360665f4f90953f84313fc4d8f8fe60e3a59c5eaa13c1a81b03b0114e26d3b8aa20757f3acb6a9bd6f952c5232557742aa7bcfad921e7f4386a001aea4
-
SSDEEP
98304:MaC4+JOoJKFVlJvLrtg6NwO1+Dgm6nffxo2tQhye89NFS27CCySzX0Lp5tFb4w5q:N1oYVlltg7qbtQhyeINFS2b0lFJ
Behavioral task
behavioral1
Sample
d397e089ee9f0f752a5c13dfe4f2d143_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
d397e089ee9f0f752a5c13dfe4f2d143_JaffaCakes118
-
Size
5.6MB
-
MD5
d397e089ee9f0f752a5c13dfe4f2d143
-
SHA1
c3977823f7ccf638f63cdb390acb628fb4d6f9f6
-
SHA256
c04ae2f8f7d73c30bf171ca8514774c78ab54f011be925b574ea3af5d45c9658
-
SHA512
32c634360665f4f90953f84313fc4d8f8fe60e3a59c5eaa13c1a81b03b0114e26d3b8aa20757f3acb6a9bd6f952c5232557742aa7bcfad921e7f4386a001aea4
-
SSDEEP
98304:MaC4+JOoJKFVlJvLrtg6NwO1+Dgm6nffxo2tQhye89NFS27CCySzX0Lp5tFb4w5q:N1oYVlltg7qbtQhyeINFS2b0lFJ
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence
-
Modiloader family
-
ModiLoader Second Stage
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Virtualization/Sandbox Evasion
1