Analysis
-
max time kernel
139s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 01:10
Behavioral task
behavioral1
Sample
88682a077cb1353750b58560c00ec534_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
88682a077cb1353750b58560c00ec534_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
88682a077cb1353750b58560c00ec534_JaffaCakes118.exe
-
Size
639KB
-
MD5
88682a077cb1353750b58560c00ec534
-
SHA1
8ce149e9303b298b1c872795cef55d94bcbfa771
-
SHA256
57ae7cb1d028b6ce66daf4667b205a5bd8993117babcafb955033cb179e0ce62
-
SHA512
4f34de85edd392aa3da72d6b967fd3949786d852f2556dfa545c4ef8739ad374a294cacabf5b48c5ff06a8a97a53eae483669eda45fd6e2f747a449b0ce0cad5
-
SSDEEP
12288:8VAtMIPq9oO6uiZDg/SvIaeCps2hmqYtHRPuOV7PAR:8KtMT+/uiZxvIaeCHYnbR
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 6 IoCs
resource yara_rule behavioral2/files/0x00070000000234ee-3.dat modiloader_stage2 behavioral2/memory/888-4-0x0000000000400000-0x00000000004A6000-memory.dmp modiloader_stage2 behavioral2/files/0x00090000000234da-6.dat modiloader_stage2 behavioral2/memory/2760-9-0x00000000020E0000-0x000000000216F000-memory.dmp modiloader_stage2 behavioral2/memory/2760-16-0x0000000000400000-0x00000000004A6000-memory.dmp modiloader_stage2 behavioral2/memory/2760-17-0x00000000020E0000-0x000000000216F000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2760 .exe -
Loads dropped DLL 2 IoCs
pid Process 2760 .exe 2760 .exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\windows\SysWOW64\dxdiag.dll .exe File created C:\windows\SysWOW64\d3dx9_20.dll .exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\directx\.dll .exe File created C:\Program Files\Windows NT\.dll .exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\.dll 88682a077cb1353750b58560c00ec534_JaffaCakes118.exe File created C:\Windows\.exe 88682a077cb1353750b58560c00ec534_JaffaCakes118.exe File opened for modification C:\Windows\.exe 88682a077cb1353750b58560c00ec534_JaffaCakes118.exe File created C:\windows\.dll .exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88682a077cb1353750b58560c00ec534_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language .exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2760 .exe 2760 .exe 2760 .exe 2760 .exe 2760 .exe 2760 .exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 888 wrote to memory of 2760 888 88682a077cb1353750b58560c00ec534_JaffaCakes118.exe 84 PID 888 wrote to memory of 2760 888 88682a077cb1353750b58560c00ec534_JaffaCakes118.exe 84 PID 888 wrote to memory of 2760 888 88682a077cb1353750b58560c00ec534_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\88682a077cb1353750b58560c00ec534_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\88682a077cb1353750b58560c00ec534_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\.exeC:\Windows\.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD5900f0e141720bc8fdb9673091d0da9fe
SHA1b2a79aa198443ed9a421702e5692a49bedd5a197
SHA2563f3359db181cf3f42b793f76abbee1057b0a74ba6913e3702a8690a0450e8dda
SHA512b0d3eaed124f39845110c6bc8087189c66a39bec4193bde9324646b0206242c6a3885e3c90eb38ecb9702ef011ddb4d901906d250539c85189b27b68066a8545
-
Filesize
639KB
MD588682a077cb1353750b58560c00ec534
SHA18ce149e9303b298b1c872795cef55d94bcbfa771
SHA25657ae7cb1d028b6ce66daf4667b205a5bd8993117babcafb955033cb179e0ce62
SHA5124f34de85edd392aa3da72d6b967fd3949786d852f2556dfa545c4ef8739ad374a294cacabf5b48c5ff06a8a97a53eae483669eda45fd6e2f747a449b0ce0cad5