Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 23:01
Behavioral task
behavioral1
Sample
e135841a19710afe8fc153ed636e2d01_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e135841a19710afe8fc153ed636e2d01_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e135841a19710afe8fc153ed636e2d01_JaffaCakes118.exe
-
Size
966KB
-
MD5
e135841a19710afe8fc153ed636e2d01
-
SHA1
a8f7a622ff176e8089ea7017d6c88ca7a0b8d1fb
-
SHA256
7b9f238467b4dcbaf60557068a8619c85866b5d835ec9a5a41e0d0f92fafb089
-
SHA512
2a9586da69b0d5b6d34ba8805c1e65ac4deed9ee622655d751e72d5dee49e142baab5e760d5ea35a1226aec9c235f1128f9336660c6f4f16df4a987972e70e90
-
SSDEEP
12288:iZQ9MEgfyJJhZfkD5JFZvgxJIvCTSmGul+hRkb2NdLk04pLdDj1ay3F:iZQqEoYJf2Jv4PSmdl+vL6G6F
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/4716-25-0x0000000000400000-0x00000000004F9000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation e135841a19710afe8fc153ed636e2d01_JaffaCakes118.exe -
Executes dropped EXE 4 IoCs
pid Process 1200 zoka.exe 3692 HarrysFilters40.exe 1224 HarrysFilters40.tmp 3156 tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e135841a19710afe8fc153ed636e2d01_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zoka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HarrysFilters40.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HarrysFilters40.tmp -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3156 tmp.exe 3156 tmp.exe 3156 tmp.exe 3156 tmp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1200 zoka.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4716 wrote to memory of 1200 4716 e135841a19710afe8fc153ed636e2d01_JaffaCakes118.exe 92 PID 4716 wrote to memory of 1200 4716 e135841a19710afe8fc153ed636e2d01_JaffaCakes118.exe 92 PID 4716 wrote to memory of 1200 4716 e135841a19710afe8fc153ed636e2d01_JaffaCakes118.exe 92 PID 4716 wrote to memory of 3692 4716 e135841a19710afe8fc153ed636e2d01_JaffaCakes118.exe 93 PID 4716 wrote to memory of 3692 4716 e135841a19710afe8fc153ed636e2d01_JaffaCakes118.exe 93 PID 4716 wrote to memory of 3692 4716 e135841a19710afe8fc153ed636e2d01_JaffaCakes118.exe 93 PID 3692 wrote to memory of 1224 3692 HarrysFilters40.exe 94 PID 3692 wrote to memory of 1224 3692 HarrysFilters40.exe 94 PID 3692 wrote to memory of 1224 3692 HarrysFilters40.exe 94 PID 1200 wrote to memory of 3156 1200 zoka.exe 95 PID 1200 wrote to memory of 3156 1200 zoka.exe 95 PID 1200 wrote to memory of 3156 1200 zoka.exe 95 PID 3156 wrote to memory of 3492 3156 tmp.exe 56 PID 3156 wrote to memory of 3492 3156 tmp.exe 56 PID 3156 wrote to memory of 3492 3156 tmp.exe 56 PID 3156 wrote to memory of 3492 3156 tmp.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\e135841a19710afe8fc153ed636e2d01_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e135841a19710afe8fc153ed636e2d01_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\zoka.exe"C:\Users\Admin\AppData\Local\Temp\zoka.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3156
-
-
-
C:\Users\Admin\AppData\Local\Temp\HarrysFilters40.exe"C:\Users\Admin\AppData\Local\Temp\HarrysFilters40.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\is-URHMR.tmp\HarrysFilters40.tmp"C:\Users\Admin\AppData\Local\Temp\is-URHMR.tmp\HarrysFilters40.tmp" /SL5="$90116,485556,54272,C:\Users\Admin\AppData\Local\Temp\HarrysFilters40.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1224
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4020,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4108 /prefetch:81⤵PID:4180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
841KB
MD513afb37ab12199a98333cfd750d03626
SHA1fabb38e4ca7d285e332c52c6d66697c967d82830
SHA2565964a6f9165a9104891b6c943f8de76d142e24c7a70ee67b89d8abe92ed3c30c
SHA5120964978ce5f6c4d98fff5781a702714ed3e4c3f5993ac956a2569a01eb269db2107a27d90f4667efcc61f6104f58532bf45b12b8889321757a4d2cd1cd2d8660
-
Filesize
696KB
MD58aa8c628f7b7b7f3e96eff00557bd0bf
SHA19af9cf61707cbba7bf0d7cbed94e8db91aff8bd6
SHA25614d4fa3ea6c3fbf6e9d284de717e73a1ebb5e77f3d5c8c98808e40ade359ea9d
SHA5125e0a4765873684fce159af81310e37b6918c923ccede0c4de0bd1e2e221425109131830cff02e3f910f15b0401ee3b4ae68700b6d29a5e8466f6d4ee1dcd6eeb
-
Filesize
31KB
MD5d811471dfbcc6b9764e0f8c31d87c5b3
SHA16cc5e219193149b1260a2fc7af25f670d9f65aff
SHA25695974775c340267e20b692e87fe16b4360d5a6e6fb1094d375a6f0f430e1cc67
SHA512ae3990f0cadf3eb3e12ad694c2fe6c8c9352f55d5a0efd38b5fe2855b5dab81b7edbc29e2cbb195939c3e99aaf015e9331f73f5861c3c74eaccfd78094000aa7
-
Filesize
112KB
MD5a675138bbf24712bf92e2c35aed18727
SHA15313ba03c0ecbc9507719e13bc504f5dea0246b1
SHA25673d7ac786c5594f3d90ecd34970c2210606efe48edeeaa2fa10edd67e95e6069
SHA512e81aee548b84546672ec879d526c94ed02d2af194f76ff564e13f1d54fc755525a8fc4f3459d1df6aba47145805e89224ed0495a6919c16184fb3aa394f1299d