General

  • Target

    f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118

  • Size

    914KB

  • Sample

    241216-f2shtswmay

  • MD5

    f78185d7e35f70d1e9ae88545cfbb3b8

  • SHA1

    07308ea95155535301d9d8b33f0dd4ce3485704e

  • SHA256

    848aaaf10168fe96c7ce4a7b836c92f6eacaa059f479da357975e5d5252e1536

  • SHA512

    21a7bf00a56afff3f95e6af9ab8c6421035dbd13103db2678f3edefd3db169fb28de3a62c4fe460dfe0f940bfbe3e41021f58d3a75e8843201b86c94721d8502

  • SSDEEP

    24576:Xh6XqAaeKch19xKNoTjJubG8vQDPbxZEJNyssWwcQKL:eqAaeKch19xKNoTl+G8vQjbkUssWwQL

Malware Config

Targets

    • Target

      f78185d7e35f70d1e9ae88545cfbb3b8_JaffaCakes118

    • Size

      914KB

    • MD5

      f78185d7e35f70d1e9ae88545cfbb3b8

    • SHA1

      07308ea95155535301d9d8b33f0dd4ce3485704e

    • SHA256

      848aaaf10168fe96c7ce4a7b836c92f6eacaa059f479da357975e5d5252e1536

    • SHA512

      21a7bf00a56afff3f95e6af9ab8c6421035dbd13103db2678f3edefd3db169fb28de3a62c4fe460dfe0f940bfbe3e41021f58d3a75e8843201b86c94721d8502

    • SSDEEP

      24576:Xh6XqAaeKch19xKNoTjJubG8vQDPbxZEJNyssWwcQKL:eqAaeKch19xKNoTl+G8vQjbkUssWwQL

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modifies firewall policy service

    • Modiloader family

    • UAC bypass

    • Windows security bypass

    • ModiLoader Second Stage

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks