Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/09/2024, 07:51
Behavioral task
behavioral1
Sample
d7d46ba4b85aa77f96f2fe484bb63e6d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7d46ba4b85aa77f96f2fe484bb63e6d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d7d46ba4b85aa77f96f2fe484bb63e6d_JaffaCakes118.exe
-
Size
90KB
-
MD5
d7d46ba4b85aa77f96f2fe484bb63e6d
-
SHA1
cdd703c10920ae0b79c9090176c06cbe2461cb61
-
SHA256
8203bc3e280c7b7c848655d6b139bd042f92eb73ef8a4fd20e2181bb865632d4
-
SHA512
02ec0fda22d36c0c199326468f4d7de6909cfd92031d0a5d15cb19072b6cd58f730e039b427b6b3998b517a1d1446bfe6dcdf2b0796c00e69b19196b850df759
-
SSDEEP
1536:fcHA5dZuvrKA1r4Jwwi55dlvo89UBYKpJ0pHWG7m9pAsiyRdQueyfo+gQp5c6mQ:fcg7UrKqUwflAZYKX6aAsiybQueqo+HV
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 16 IoCs
resource yara_rule behavioral2/memory/4756-10-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1656-12-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1656-13-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1656-14-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1656-15-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1656-16-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1656-17-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1656-18-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1656-19-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1656-20-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1656-21-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1656-22-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1656-23-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1656-24-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1656-25-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/1656-26-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation d7d46ba4b85aa77f96f2fe484bb63e6d_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1656 msmgrs.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ntdll.lnk msmgrs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ntdll.lnk msmgrs.exe -
Executes dropped EXE 1 IoCs
pid Process 1656 msmgrs.exe -
resource yara_rule behavioral2/memory/4756-0-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/files/0x0002000000022a83-5.dat upx behavioral2/memory/4756-10-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1656-12-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1656-13-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1656-14-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1656-15-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1656-16-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1656-17-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1656-18-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1656-19-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1656-20-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1656-21-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1656-22-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1656-23-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1656-24-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1656-25-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/1656-26-0x0000000000400000-0x000000000043C000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wins\setup\msmgrs.exe d7d46ba4b85aa77f96f2fe484bb63e6d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wins\setup\msmgrs.exe d7d46ba4b85aa77f96f2fe484bb63e6d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7d46ba4b85aa77f96f2fe484bb63e6d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msmgrs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4756 d7d46ba4b85aa77f96f2fe484bb63e6d_JaffaCakes118.exe 4756 d7d46ba4b85aa77f96f2fe484bb63e6d_JaffaCakes118.exe 1656 msmgrs.exe 1656 msmgrs.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4756 wrote to memory of 1656 4756 d7d46ba4b85aa77f96f2fe484bb63e6d_JaffaCakes118.exe 89 PID 4756 wrote to memory of 1656 4756 d7d46ba4b85aa77f96f2fe484bb63e6d_JaffaCakes118.exe 89 PID 4756 wrote to memory of 1656 4756 d7d46ba4b85aa77f96f2fe484bb63e6d_JaffaCakes118.exe 89 PID 1656 wrote to memory of 3972 1656 msmgrs.exe 91 PID 1656 wrote to memory of 3972 1656 msmgrs.exe 91 PID 1656 wrote to memory of 3972 1656 msmgrs.exe 91 PID 1656 wrote to memory of 2112 1656 msmgrs.exe 92 PID 1656 wrote to memory of 2112 1656 msmgrs.exe 92 PID 1656 wrote to memory of 2112 1656 msmgrs.exe 92 PID 3972 wrote to memory of 3416 3972 cmd.exe 95 PID 3972 wrote to memory of 3416 3972 cmd.exe 95 PID 3972 wrote to memory of 3416 3972 cmd.exe 95 PID 2112 wrote to memory of 872 2112 cmd.exe 96 PID 2112 wrote to memory of 872 2112 cmd.exe 96 PID 2112 wrote to memory of 872 2112 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7d46ba4b85aa77f96f2fe484bb63e6d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d7d46ba4b85aa77f96f2fe484bb63e6d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\wins\setup\msmgrs.exe"C:\Windows\system32\wins\setup\msmgrs.exe"2⤵
- Deletes itself
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\cmd.execmd.exe + command.com /c regsvr32 /u /s %WINDIR%/"Downloaded Program Files"/JaguarEditControl.dll3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows/"Downloaded Program Files"/JaguarEditControl.dll4⤵
- System Location Discovery: System Language Discovery
PID:3416
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe + command.com /c regsvr32 /u /s %WINDIR%/"Downloaded Program Files"/tebedit.ocx3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows/"Downloaded Program Files"/tebedit.ocx4⤵
- System Location Discovery: System Language Discovery
PID:872
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5d7d46ba4b85aa77f96f2fe484bb63e6d
SHA1cdd703c10920ae0b79c9090176c06cbe2461cb61
SHA2568203bc3e280c7b7c848655d6b139bd042f92eb73ef8a4fd20e2181bb865632d4
SHA51202ec0fda22d36c0c199326468f4d7de6909cfd92031d0a5d15cb19072b6cd58f730e039b427b6b3998b517a1d1446bfe6dcdf2b0796c00e69b19196b850df759