General
-
Target
JaffaCakes118_79456dd6b9bb37547052aa11a2383c49
-
Size
589KB
-
Sample
250104-mxqxrswmay
-
MD5
79456dd6b9bb37547052aa11a2383c49
-
SHA1
cf9682f729b795d68ec1f7fcaa1c97a679f2ce95
-
SHA256
5460254e81c38df491d627a14e3d8d046171d2e66f9f43f53b6e31350ba48834
-
SHA512
5c1c44bd582a2a2468b0f39221371162cdb25bb4c26943f573aa1a68ef15332d02eb4186ba7f3c523986fa62008a3a9d0b7a14a518475a1ab00291d0b9983546
-
SSDEEP
6144:dBgh/58KGip9lmh0UwwDdxtPw13OyhFR8uHG3XV+j5eZIPnBFlRe+s2R7hSP1p75:dBMmKGnhDT+JlCTXMjQIDlR/VwYA2GsE
Behavioral task
behavioral1
Sample
JaffaCakes118_79456dd6b9bb37547052aa11a2383c49.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_79456dd6b9bb37547052aa11a2383c49.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_79456dd6b9bb37547052aa11a2383c49
-
Size
589KB
-
MD5
79456dd6b9bb37547052aa11a2383c49
-
SHA1
cf9682f729b795d68ec1f7fcaa1c97a679f2ce95
-
SHA256
5460254e81c38df491d627a14e3d8d046171d2e66f9f43f53b6e31350ba48834
-
SHA512
5c1c44bd582a2a2468b0f39221371162cdb25bb4c26943f573aa1a68ef15332d02eb4186ba7f3c523986fa62008a3a9d0b7a14a518475a1ab00291d0b9983546
-
SSDEEP
6144:dBgh/58KGip9lmh0UwwDdxtPw13OyhFR8uHG3XV+j5eZIPnBFlRe+s2R7hSP1p75:dBMmKGnhDT+JlCTXMjQIDlR/VwYA2GsE
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3