General
-
Target
f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118
-
Size
914KB
-
Sample
241216-f2shtswmay
-
MD5
f78185d7e35f70d1e9ae88545cfbb3b8
-
SHA1
07308ea95155535301d9d8b33f0dd4ce3485704e
-
SHA256
848aaaf10168fe96c7ce4a7b836c92f6eacaa059f479da357975e5d5252e1536
-
SHA512
21a7bf00a56afff3f95e6af9ab8c6421035dbd13103db2678f3edefd3db169fb28de3a62c4fe460dfe0f940bfbe3e41021f58d3a75e8843201b86c94721d8502
-
SSDEEP
24576:Xh6XqAaeKch19xKNoTjJubG8vQDPbxZEJNyssWwcQKL:eqAaeKch19xKNoTl+G8vQjbkUssWwQL
Static task
static1
Behavioral task
behavioral1
Sample
f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118
-
Size
914KB
-
MD5
f78185d7e35f70d1e9ae88545cfbb3b8
-
SHA1
07308ea95155535301d9d8b33f0dd4ce3485704e
-
SHA256
848aaaf10168fe96c7ce4a7b836c92f6eacaa059f479da357975e5d5252e1536
-
SHA512
21a7bf00a56afff3f95e6af9ab8c6421035dbd13103db2678f3edefd3db169fb28de3a62c4fe460dfe0f940bfbe3e41021f58d3a75e8843201b86c94721d8502
-
SSDEEP
24576:Xh6XqAaeKch19xKNoTjJubG8vQDPbxZEJNyssWwcQKL:eqAaeKch19xKNoTl+G8vQjbkUssWwQL
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies firewall policy service
-
Modiloader family
-
ModiLoader Second Stage
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
8