Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 11:52
Behavioral task
behavioral1
Sample
c8c4993c5e282a1108aa2f49b01d6816_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c8c4993c5e282a1108aa2f49b01d6816_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c8c4993c5e282a1108aa2f49b01d6816_JaffaCakes118.exe
-
Size
482KB
-
MD5
c8c4993c5e282a1108aa2f49b01d6816
-
SHA1
670ff39dee6e3e145a7daa3e5eaed22ca1f9d46e
-
SHA256
613a939f984583d3e8c15796c40f36772cb5e3dfcec96e15450d5b7e062c5496
-
SHA512
af7aa297a31096e14fa5160aba77fad9ae926079f808ca012f18fba840890ac6bec67c171127a8d6b3d2dcffe42ce84b4daccbd0219c8e99786efd2c8485b868
-
SSDEEP
12288:yi7BUYjGx+CqEA0+01w+xPjGbSKxmlTHe:B7uY8dAkwQjGbjmlT+
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 16 IoCs
resource yara_rule behavioral2/files/0x000900000002341f-5.dat modiloader_stage2 behavioral2/memory/4620-9-0x0000000000400000-0x000000000047E000-memory.dmp modiloader_stage2 behavioral2/memory/4784-12-0x0000000000400000-0x000000000047E000-memory.dmp modiloader_stage2 behavioral2/memory/4784-13-0x0000000000400000-0x000000000047E000-memory.dmp modiloader_stage2 behavioral2/memory/4784-14-0x0000000000400000-0x000000000047E000-memory.dmp modiloader_stage2 behavioral2/memory/4784-15-0x0000000000400000-0x000000000047E000-memory.dmp modiloader_stage2 behavioral2/memory/4784-16-0x0000000000400000-0x000000000047E000-memory.dmp modiloader_stage2 behavioral2/memory/4784-17-0x0000000000400000-0x000000000047E000-memory.dmp modiloader_stage2 behavioral2/memory/4784-18-0x0000000000400000-0x000000000047E000-memory.dmp modiloader_stage2 behavioral2/memory/4784-19-0x0000000000400000-0x000000000047E000-memory.dmp modiloader_stage2 behavioral2/memory/4784-20-0x0000000000400000-0x000000000047E000-memory.dmp modiloader_stage2 behavioral2/memory/4784-21-0x0000000000400000-0x000000000047E000-memory.dmp modiloader_stage2 behavioral2/memory/4784-22-0x0000000000400000-0x000000000047E000-memory.dmp modiloader_stage2 behavioral2/memory/4784-23-0x0000000000400000-0x000000000047E000-memory.dmp modiloader_stage2 behavioral2/memory/4784-24-0x0000000000400000-0x000000000047E000-memory.dmp modiloader_stage2 behavioral2/memory/4784-25-0x0000000000400000-0x000000000047E000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation c8c4993c5e282a1108aa2f49b01d6816_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 4784 msmgrs.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ntdll.lnk msmgrs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ntdll.lnk msmgrs.exe -
Executes dropped EXE 1 IoCs
pid Process 4784 msmgrs.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wins\setup\msmgrs.exe c8c4993c5e282a1108aa2f49b01d6816_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wins\setup\msmgrs.exe c8c4993c5e282a1108aa2f49b01d6816_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8c4993c5e282a1108aa2f49b01d6816_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msmgrs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4620 c8c4993c5e282a1108aa2f49b01d6816_JaffaCakes118.exe 4620 c8c4993c5e282a1108aa2f49b01d6816_JaffaCakes118.exe 4784 msmgrs.exe 4784 msmgrs.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4620 wrote to memory of 4784 4620 c8c4993c5e282a1108aa2f49b01d6816_JaffaCakes118.exe 87 PID 4620 wrote to memory of 4784 4620 c8c4993c5e282a1108aa2f49b01d6816_JaffaCakes118.exe 87 PID 4620 wrote to memory of 4784 4620 c8c4993c5e282a1108aa2f49b01d6816_JaffaCakes118.exe 87 PID 4784 wrote to memory of 2744 4784 msmgrs.exe 88 PID 4784 wrote to memory of 2744 4784 msmgrs.exe 88 PID 4784 wrote to memory of 2744 4784 msmgrs.exe 88 PID 4784 wrote to memory of 3204 4784 msmgrs.exe 89 PID 4784 wrote to memory of 3204 4784 msmgrs.exe 89 PID 4784 wrote to memory of 3204 4784 msmgrs.exe 89 PID 4784 wrote to memory of 1708 4784 msmgrs.exe 90 PID 4784 wrote to memory of 1708 4784 msmgrs.exe 90 PID 4784 wrote to memory of 1708 4784 msmgrs.exe 90 PID 2744 wrote to memory of 4316 2744 cmd.exe 94 PID 2744 wrote to memory of 4316 2744 cmd.exe 94 PID 2744 wrote to memory of 4316 2744 cmd.exe 94 PID 1708 wrote to memory of 3916 1708 cmd.exe 95 PID 1708 wrote to memory of 3916 1708 cmd.exe 95 PID 1708 wrote to memory of 3916 1708 cmd.exe 95 PID 3204 wrote to memory of 3324 3204 cmd.exe 96 PID 3204 wrote to memory of 3324 3204 cmd.exe 96 PID 3204 wrote to memory of 3324 3204 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8c4993c5e282a1108aa2f49b01d6816_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c8c4993c5e282a1108aa2f49b01d6816_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\wins\setup\msmgrs.exe"C:\Windows\system32\wins\setup\msmgrs.exe"2⤵
- Deletes itself
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\cmd.execmd.exe + command.com /c regsvr32 /u /s %WINDIR%/"Downloaded Program Files"/JaguarEditControl.dll3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows/"Downloaded Program Files"/JaguarEditControl.dll4⤵
- System Location Discovery: System Language Discovery
PID:4316
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe + command.com /c regsvr32 /u /s %WINDIR%/"Downloaded Program Files"/tebedit.ocx3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows/"Downloaded Program Files"/tebedit.ocx4⤵
- System Location Discovery: System Language Discovery
PID:3324
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe + command.com /c regsvr32 /u /s %WINDIR%/"Downloaded Program Files"/JaguarEdit4ISB.dll3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows/"Downloaded Program Files"/JaguarEdit4ISB.dll4⤵
- System Location Discovery: System Language Discovery
PID:3916
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
482KB
MD5c8c4993c5e282a1108aa2f49b01d6816
SHA1670ff39dee6e3e145a7daa3e5eaed22ca1f9d46e
SHA256613a939f984583d3e8c15796c40f36772cb5e3dfcec96e15450d5b7e062c5496
SHA512af7aa297a31096e14fa5160aba77fad9ae926079f808ca012f18fba840890ac6bec67c171127a8d6b3d2dcffe42ce84b4daccbd0219c8e99786efd2c8485b868