General
-
Target
JaffaCakes118_08992bca636603183380d89d6c1f5f2a
-
Size
84KB
-
Sample
250122-aesx7ayler
-
MD5
08992bca636603183380d89d6c1f5f2a
-
SHA1
ed1f8c85ceae72fc1dd4bd7f1016bc355313b31f
-
SHA256
7690be168f0c3371b82010aed880fc57e05d79e4efe4ac13f295d3e7e057684b
-
SHA512
8dc5e96004388d49ab90c8c016af43f24b1276064a2c04c1cbf0ede916e6f20b073b337a55d7f05f2efbabb34f5e645c7d416a7029dd135a5f781fdd3847d31b
-
SSDEEP
1536:H/PCcj294GN7fiIEAeLHJxYNhHKbI11eb6LZmpu9HrVIIlWfRHkFP20PUGFa5:XLa94GN7fiIEAeLHJx0l11G4ZmpOHBIb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_08992bca636603183380d89d6c1f5f2a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_08992bca636603183380d89d6c1f5f2a.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_08992bca636603183380d89d6c1f5f2a
-
Size
84KB
-
MD5
08992bca636603183380d89d6c1f5f2a
-
SHA1
ed1f8c85ceae72fc1dd4bd7f1016bc355313b31f
-
SHA256
7690be168f0c3371b82010aed880fc57e05d79e4efe4ac13f295d3e7e057684b
-
SHA512
8dc5e96004388d49ab90c8c016af43f24b1276064a2c04c1cbf0ede916e6f20b073b337a55d7f05f2efbabb34f5e645c7d416a7029dd135a5f781fdd3847d31b
-
SSDEEP
1536:H/PCcj294GN7fiIEAeLHJxYNhHKbI11eb6LZmpu9HrVIIlWfRHkFP20PUGFa5:XLa94GN7fiIEAeLHJx0l11G4ZmpOHBIb
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1