Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2024, 20:49
Behavioral task
behavioral1
Sample
cd937b96f400ae28d59a2d5f8d684ba8_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cd937b96f400ae28d59a2d5f8d684ba8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cd937b96f400ae28d59a2d5f8d684ba8_JaffaCakes118.exe
-
Size
73KB
-
MD5
cd937b96f400ae28d59a2d5f8d684ba8
-
SHA1
ed3eb80169ecad815508e1c55f3e20a6a6ef3747
-
SHA256
ecf9de801ecd7f873af3a890600aead419d5b88612751dfc89a479d23a3d7a5e
-
SHA512
e327c7d9169a76f0267ca73a3532eefb5f19b7f449b9a5c77c0320fa8aa4575e97ee036b0b5a949b05954fe989925a6eb91def6cde14bc4a3e45f064f933381a
-
SSDEEP
1536:f8oGku5lOA9RouT39LiUDLK/OOh4o1XmUS+C:f8oGCA9RouT39LiuW/OOhfYv+C
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/5636-8-0x0000000000400000-0x0000000000419000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation cd937b96f400ae28d59a2d5f8d684ba8_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1756 server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1676 1756 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd937b96f400ae28d59a2d5f8d684ba8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5636 wrote to memory of 1756 5636 cd937b96f400ae28d59a2d5f8d684ba8_JaffaCakes118.exe 91 PID 5636 wrote to memory of 1756 5636 cd937b96f400ae28d59a2d5f8d684ba8_JaffaCakes118.exe 91 PID 5636 wrote to memory of 1756 5636 cd937b96f400ae28d59a2d5f8d684ba8_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd937b96f400ae28d59a2d5f8d684ba8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cd937b96f400ae28d59a2d5f8d684ba8_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5636 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 4803⤵
- Program crash
PID:1676
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1756 -ip 17561⤵PID:5948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4300,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=1424 /prefetch:81⤵PID:5308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD578fd075bab9f67776a45c36fbace64bd
SHA14bb3cdee77299bcea1fa3633ecad74a1c3b1dd35
SHA25672adc4c24164156a2bca0827dcebf0e8fe3da8be3481a877acf5cc03a2d35971
SHA5125913568e3c616220d195dfa60ae4df21dfe633cd2bbf9c3bdf37bba8cd87f2f70b1d54ae32316e78c7378119b54039a18d68a449fc64c71ac241c5ca98d142d5