General
-
Target
JaffaCakes118_7aab1bc154a4883326dafdab7b2b27a0
-
Size
284KB
-
Sample
250104-tyjcmsxkhv
-
MD5
7aab1bc154a4883326dafdab7b2b27a0
-
SHA1
dee7d97a339a09d5bad5afc3024cd3c9ae83a346
-
SHA256
baed69729f713c587531e876036d332ed17ee8a6865e28440615e41ca4514022
-
SHA512
04e363fecbd448bfdcbdf1563ac5838ef8495fc9789a7761b61e8b51fdf3e495662d94fd291b1d3dea631179261459a42ecf737ab828975db3d06620443bf36a
-
SSDEEP
6144:SbAkul2Yb/P0A9Y3HCQX4BVIuhS5v19fCSFxuo:Nkur/P0A9Y3iV5hCvLCSfH
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7aab1bc154a4883326dafdab7b2b27a0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7aab1bc154a4883326dafdab7b2b27a0.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_7aab1bc154a4883326dafdab7b2b27a0
-
Size
284KB
-
MD5
7aab1bc154a4883326dafdab7b2b27a0
-
SHA1
dee7d97a339a09d5bad5afc3024cd3c9ae83a346
-
SHA256
baed69729f713c587531e876036d332ed17ee8a6865e28440615e41ca4514022
-
SHA512
04e363fecbd448bfdcbdf1563ac5838ef8495fc9789a7761b61e8b51fdf3e495662d94fd291b1d3dea631179261459a42ecf737ab828975db3d06620443bf36a
-
SSDEEP
6144:SbAkul2Yb/P0A9Y3HCQX4BVIuhS5v19fCSFxuo:Nkur/P0A9Y3iV5hCvLCSfH
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Looks for VirtualBox Guest Additions in registry
-
ModiLoader Second Stage
-
Adds policy Run key to start application
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2