Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2024, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe
-
Size
2.8MB
-
MD5
cce190859aaac7ca40cbdf28938d78ac
-
SHA1
ad3aa982f6c66483096fc55c0690d90a63ad41b4
-
SHA256
5d7a482dc028dc24f2d6e1e78976fe541e45b7641e0e0f1d08b4da239dddce49
-
SHA512
900cb7056a462df37266cf78fc9d138ef855e9f9760f177a11d1a025ac17256386727321f8d4d26b31b8a9fa530c74608175bd1f7d7f2d4714d2d8cf7f1438e9
-
SSDEEP
49152:puVt+eoyYLwaay2TXBBIMQjeT+Ld24JrZoBWLtpM65l1PzSBp6Ty:puuebYLwaay2TXBN2w+p28ZCWg65l0BD
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/4992-1-0x0000000010001000-0x000000001000B000-memory.dmp modiloader_stage2 behavioral2/memory/4992-5-0x0000000010000000-0x00000000102C1000-memory.dmp modiloader_stage2 behavioral2/memory/4992-6-0x0000000010000000-0x00000000102C1000-memory.dmp modiloader_stage2 behavioral2/memory/4992-4-0x0000000010001000-0x000000001000B000-memory.dmp modiloader_stage2 -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Wine cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4992 cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4992 set thread context of 5100 4992 cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe 142 -
Program crash 25 IoCs
pid pid_target Process procid_target 4540 4992 WerFault.exe 83 2196 4992 WerFault.exe 83 2964 4992 WerFault.exe 83 2824 4992 WerFault.exe 83 5084 4992 WerFault.exe 83 3096 4992 WerFault.exe 83 1480 4992 WerFault.exe 83 1048 4992 WerFault.exe 83 3500 4992 WerFault.exe 83 2940 4992 WerFault.exe 83 3416 4992 WerFault.exe 83 212 4992 WerFault.exe 83 1008 4992 WerFault.exe 83 2668 4992 WerFault.exe 83 2456 4992 WerFault.exe 83 3712 4992 WerFault.exe 83 3504 4992 WerFault.exe 83 3280 4992 WerFault.exe 83 1708 4992 WerFault.exe 83 4320 4992 WerFault.exe 83 1608 4992 WerFault.exe 83 1736 4992 WerFault.exe 83 1576 4992 WerFault.exe 83 1948 4992 WerFault.exe 83 4868 4992 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4992 cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe 4992 cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe 5100 cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe 5100 cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4992 wrote to memory of 5100 4992 cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe 142 PID 4992 wrote to memory of 5100 4992 cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe 142 PID 4992 wrote to memory of 5100 4992 cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe 142 PID 4992 wrote to memory of 5100 4992 cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe 142 PID 4992 wrote to memory of 5100 4992 cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe 142 PID 5100 wrote to memory of 3508 5100 cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe 56 PID 5100 wrote to memory of 3508 5100 cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe 56 PID 5100 wrote to memory of 3508 5100 cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe 56 PID 5100 wrote to memory of 3508 5100 cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe 56 PID 5100 wrote to memory of 3508 5100 cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe 56 PID 5100 wrote to memory of 3508 5100 cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe"2⤵
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 2763⤵
- Program crash
PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 3363⤵
- Program crash
PID:2196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 3443⤵
- Program crash
PID:2964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 4883⤵
- Program crash
PID:2824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 5083⤵
- Program crash
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 5043⤵
- Program crash
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 3483⤵
- Program crash
PID:1480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 3363⤵
- Program crash
PID:1048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 5123⤵
- Program crash
PID:3500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 4923⤵
- Program crash
PID:2940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 5323⤵
- Program crash
PID:3416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 5403⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 4963⤵
- Program crash
PID:1008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 3323⤵
- Program crash
PID:2668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 5243⤵
- Program crash
PID:2456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 5283⤵
- Program crash
PID:3712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 5003⤵
- Program crash
PID:3504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 5363⤵
- Program crash
PID:3280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 3323⤵
- Program crash
PID:1708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 3483⤵
- Program crash
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 5323⤵
- Program crash
PID:1608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 3323⤵
- Program crash
PID:1736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 5323⤵
- Program crash
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 5083⤵
- Program crash
PID:1948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 5243⤵
- Program crash
PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\cce190859aaac7ca40cbdf28938d78ac_JaffaCakes118.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5100
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4992 -ip 49921⤵PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4992 -ip 49921⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4992 -ip 49921⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4992 -ip 49921⤵PID:1784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4992 -ip 49921⤵PID:3904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4992 -ip 49921⤵PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4992 -ip 49921⤵PID:696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4992 -ip 49921⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4992 -ip 49921⤵PID:540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4992 -ip 49921⤵PID:2840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4992 -ip 49921⤵PID:4496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4992 -ip 49921⤵PID:2392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4992 -ip 49921⤵PID:1252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4992 -ip 49921⤵PID:1084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4992 -ip 49921⤵PID:972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4992 -ip 49921⤵PID:1612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4992 -ip 49921⤵PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4992 -ip 49921⤵PID:2296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4992 -ip 49921⤵PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4992 -ip 49921⤵PID:3260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4992 -ip 49921⤵PID:2200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4992 -ip 49921⤵PID:4416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4992 -ip 49921⤵PID:1156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4992 -ip 49921⤵PID:2036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4992 -ip 49921⤵PID:1260