Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 10:42
Behavioral task
behavioral1
Sample
d42c413f2403b7aec3f312bf47b5593b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d42c413f2403b7aec3f312bf47b5593b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d42c413f2403b7aec3f312bf47b5593b_JaffaCakes118.exe
-
Size
100KB
-
MD5
d42c413f2403b7aec3f312bf47b5593b
-
SHA1
8770ffbf572cdc822c074f2bb69b14b7b36bf1a9
-
SHA256
e8dfdee47bdaec7bf8d7699fb47c35a3c97c9418cea367729caa6e09e6428af4
-
SHA512
e4ad32d1fd1a32eeef0c99b8c3ec2db24fb26f81f2608dc8d2b5560a9f7a8a7e8e386513af5453057770fd8a4968f328b903d0ee078d52e91a6ae8734c5196eb
-
SSDEEP
1536:3yPcsTRIFzvAqtMNu6r0drgCNeAiza+z/Q8J/ePE35DgRUq6ixuDYnJ:3yvReOu6r0drZmjfO2q1uUn
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/408-10-0x0000000000400000-0x0000000000420000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation d42c413f2403b7aec3f312bf47b5593b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4044 ãáÝ ÌÇåÒ.exe -
resource yara_rule behavioral2/files/0x000900000002362a-4.dat upx behavioral2/memory/4044-8-0x0000000010000000-0x0000000010048000-memory.dmp upx behavioral2/memory/4044-12-0x0000000010000000-0x0000000010048000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2488 4044 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d42c413f2403b7aec3f312bf47b5593b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ãáÝ ÌÇåÒ.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 408 wrote to memory of 4044 408 d42c413f2403b7aec3f312bf47b5593b_JaffaCakes118.exe 92 PID 408 wrote to memory of 4044 408 d42c413f2403b7aec3f312bf47b5593b_JaffaCakes118.exe 92 PID 408 wrote to memory of 4044 408 d42c413f2403b7aec3f312bf47b5593b_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d42c413f2403b7aec3f312bf47b5593b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d42c413f2403b7aec3f312bf47b5593b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\ãáÝ ÌÇåÒ.exe"C:\Users\Admin\AppData\Local\Temp\ãáÝ ÌÇåÒ.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 4963⤵
- Program crash
PID:2488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4044 -ip 40441⤵PID:4180
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4356,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=1040 /prefetch:81⤵PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5a0bc9024da673185fb0bbb1cd49e1c22
SHA160703e936e2d40811f2686951d53fa94e05021a8
SHA256f08097ce3e421316183e8e080394981644e9b19874a92bab5a9f12a9d5ad5191
SHA5120bfe7188a8d9547b1fb116a3cb0e95fd65e2424e092bb96e47f630c7c19b36b96ba53254e33e925a9140b2affd4f830d0120197e0fbfa1e1bf04a556c5dff783