Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 06:22
Behavioral task
behavioral1
Sample
d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe
-
Size
105KB
-
MD5
d9c676246414b5c1211ce337b1e332b7
-
SHA1
64147ef6ed8c70fd5ceb25b194573c0f5729f8bf
-
SHA256
603e2b74c02fc34942f234a2e600be53d828698f0fce8ced123c0a9570568758
-
SHA512
c33a18447c7b46b1f06b4d4757e2e7e2e618f10ece3278395fd7c471f7d29d38892037c4d8002f94c090eb304b830b4db11177eebb940bc07d1904a6a58c3650
-
SSDEEP
1536:XCGcRjbb53/KCY3L3RiAfLiZaK+QGY50I1HUMFyq6DmF9HRKw+gj:cl3/VefLibrP1H5yTC1RKCj
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral2/files/0x00080000000234cb-4.dat modiloader_stage2 behavioral2/memory/540-8-0x0000000000400000-0x0000000000421000-memory.dmp modiloader_stage2 behavioral2/memory/1152-15-0x0000000010000000-0x000000001000C000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1152 Systemloader.exe 3844 Systemloader.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1152 set thread context of 3844 1152 Systemloader.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3644 3844 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Systemloader.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 540 wrote to memory of 1152 540 d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe 84 PID 540 wrote to memory of 1152 540 d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe 84 PID 540 wrote to memory of 1152 540 d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe 84 PID 1152 wrote to memory of 3844 1152 Systemloader.exe 85 PID 1152 wrote to memory of 3844 1152 Systemloader.exe 85 PID 1152 wrote to memory of 3844 1152 Systemloader.exe 85 PID 1152 wrote to memory of 3844 1152 Systemloader.exe 85 PID 1152 wrote to memory of 3844 1152 Systemloader.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Systemloader.exe"C:\Systemloader.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Systemloader.exeC:\Systemloader.exe3⤵
- Executes dropped EXE
PID:3844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 4604⤵
- Program crash
PID:3644
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3844 -ip 38441⤵PID:4248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5833248cd02b0c578feb069acc66e9d6e
SHA138fd8010f55be6012f3eef353ad4d5c44f7a9080
SHA256ed2b5f400ca4863ebed24194fb81d47282d0be0877f23e84a197d9b748e0c49e
SHA512087f9a77b2fc879c873d4d6392990104831f3e53827299dec917b17dc036def68551a867b36b2b88eddae1748df0447e65e0628082824349e4fe703b967acc0f
-
Filesize
22KB
MD51b58ac36575d9c69123aaba7aef86e8a
SHA121146726066641d70a3f800d339b428f8042f714
SHA256b632e67b6e4b6c417c3e39e1c15ca2762158a01e81a3e5e1157ec6acd379779f
SHA512503ab01530714abf076f786e397e14b0c08e31fe3e3bcb6a0e38c2c767e65cb5c5755f131c426ce290a7bfe73876a3c36225da258db2ca4a5dc583d4aca0af6e