General
-
Target
JaffaCakes118_03b9671be7d36d355c365e01b91c4ec6
-
Size
256KB
-
Sample
250121-lxheysykcl
-
MD5
03b9671be7d36d355c365e01b91c4ec6
-
SHA1
7b3a1acdee78ab20271757218166319b13def4f4
-
SHA256
ae28321888cc6214ceb5bbeb42ed2d37a38e3f2316f25076506b70fc9fd1a59f
-
SHA512
eba21e8975c3d9ee45221e8ed309ab29ce88872ad664026db8e01888b92954471f9594f0d552e9e632bf54a5afd02b763961d47e70ddf0e0660099af531fba52
-
SSDEEP
3072:r2Ut9IeAwf0RMEIVTpfEIEdaVo8TcWky4w6Y6J69fa8ew5vG8cXJ4OSqAy2IYjYl:r7tfqixJaQ37XqlTL4mLHZBWpnCUbQf
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_03b9671be7d36d355c365e01b91c4ec6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_03b9671be7d36d355c365e01b91c4ec6.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_03b9671be7d36d355c365e01b91c4ec6
-
Size
256KB
-
MD5
03b9671be7d36d355c365e01b91c4ec6
-
SHA1
7b3a1acdee78ab20271757218166319b13def4f4
-
SHA256
ae28321888cc6214ceb5bbeb42ed2d37a38e3f2316f25076506b70fc9fd1a59f
-
SHA512
eba21e8975c3d9ee45221e8ed309ab29ce88872ad664026db8e01888b92954471f9594f0d552e9e632bf54a5afd02b763961d47e70ddf0e0660099af531fba52
-
SSDEEP
3072:r2Ut9IeAwf0RMEIVTpfEIEdaVo8TcWky4w6Y6J69fa8ew5vG8cXJ4OSqAy2IYjYl:r7tfqixJaQ37XqlTL4mLHZBWpnCUbQf
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
UAC bypass
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3