Analysis
-
max time kernel
96s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/09/2024, 16:08
Behavioral task
behavioral1
Sample
d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe
-
Size
766KB
-
MD5
d88e602afd209478cb4014d2eaf3aca7
-
SHA1
69834f5d0f3f8dd8c944ae1ca016d1d284d4748f
-
SHA256
cddbbc4f65ebd1790d40f6b451ffa1783e521af3886db5053ae994a83bcb50c5
-
SHA512
cd2d810416bd2be223bd142db48ce02c7cd0ee5f7eb8d97ff2174736995448403c40710ea5caf1ae589f3322faa94f8cf1c994e7e5d36be308b8be691751ca58
-
SSDEEP
12288:HV5EEDkzhc5S1HwFa4dhq0B/71n3EbdtlrA8O/XThdfK:15JId1HwsH0JFWXfOXTa
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral2/files/0x000300000001e62f-4.dat modiloader_stage2 behavioral2/memory/928-9-0x0000000000400000-0x00000000004C8000-memory.dmp modiloader_stage2 behavioral2/memory/2924-11-0x00000000009C0000-0x0000000000A88000-memory.dmp modiloader_stage2 behavioral2/memory/652-14-0x0000000000400000-0x00000000004C8000-memory.dmp modiloader_stage2 behavioral2/memory/5060-15-0x0000000000400000-0x00000000004C8000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 652 rejoice38.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice38.exe rejoice38.exe File opened for modification C:\Windows\SysWOW64\_rejoice38.exe rejoice38.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 652 set thread context of 928 652 rejoice38.exe 87 PID 652 set thread context of 2924 652 rejoice38.exe 88 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice38.exe d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice38.exe d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3460 928 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3403343061" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F4DE6C8E-6F8E-11EF-8D5B-FA03B01A99D1} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31130523" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432749500" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31130523" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31130523" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3403812242" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31130523" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3403812242" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3403343061" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 IEXPLORE.EXE 2924 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 928 calc.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 5060 wrote to memory of 652 5060 d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe 86 PID 5060 wrote to memory of 652 5060 d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe 86 PID 5060 wrote to memory of 652 5060 d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe 86 PID 652 wrote to memory of 928 652 rejoice38.exe 87 PID 652 wrote to memory of 928 652 rejoice38.exe 87 PID 652 wrote to memory of 928 652 rejoice38.exe 87 PID 652 wrote to memory of 928 652 rejoice38.exe 87 PID 652 wrote to memory of 928 652 rejoice38.exe 87 PID 652 wrote to memory of 2924 652 rejoice38.exe 88 PID 652 wrote to memory of 2924 652 rejoice38.exe 88 PID 652 wrote to memory of 2924 652 rejoice38.exe 88 PID 5060 wrote to memory of 116 5060 d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe 91 PID 5060 wrote to memory of 116 5060 d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe 91 PID 5060 wrote to memory of 116 5060 d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe 91 PID 2924 wrote to memory of 2216 2924 IEXPLORE.EXE 95 PID 2924 wrote to memory of 2216 2924 IEXPLORE.EXE 95 PID 2924 wrote to memory of 2216 2924 IEXPLORE.EXE 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice38.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice38.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵
- Suspicious use of UnmapMainImage
PID:928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 124⤵
- Program crash
PID:3460
-
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat""2⤵
- System Location Discovery: System Language Discovery
PID:116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 928 -ip 9281⤵PID:320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD579d3e9601b5e915d60c6b279c7a904d9
SHA11cba67e092ffae396fbb66a616bf25c812ae1088
SHA256dfdd9ebb724ca96d4c916e267b36bfb059a138923241acbdb7782df79228da50
SHA512536af758940af3becc554d112c591f150b0e88ef125beb5b02bbd0e9d41616e7f9edf7d85c5789b8aec0b1698d244d705a345ea550451f1959a11d1ce744f37b
-
Filesize
766KB
MD5d88e602afd209478cb4014d2eaf3aca7
SHA169834f5d0f3f8dd8c944ae1ca016d1d284d4748f
SHA256cddbbc4f65ebd1790d40f6b451ffa1783e521af3886db5053ae994a83bcb50c5
SHA512cd2d810416bd2be223bd142db48ce02c7cd0ee5f7eb8d97ff2174736995448403c40710ea5caf1ae589f3322faa94f8cf1c994e7e5d36be308b8be691751ca58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD59b8d7423bbba21ab6b79a94ac7b8f67c
SHA1f472a0aa8acc6a81157033b2eb43b29ec2722b1e
SHA2560a613829c745cc1fa427c9f0f2b136cee486b3ca963b676397c9106553924631
SHA5122efae232139c4487bf82ef061bbe0406f4f6972ca1d949634e5282651b6cc4b4ae6d78a48c65ac6fed9d8957763d3512fd503b2a2f5059da4bf5841be022250e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5d0f3f7d2aa6b2bdbdcdcac37eda88b24
SHA109ccd9da67759e517c9753107985f0beaa9b171e
SHA256cd7fd82f7e544926a5d22bfc141b3c067eacdffda462997fe6c0cf42590f8bef
SHA512028fed797f22376dd9ea7526d6c613b0fb0177ccdfb1340ece5631f6949c93fb27b73479be26a3f04111579639c085cc0dda39a328c9fe6b7c5d97be88da377f
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee