Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 18:57
Static task
static1
Behavioral task
behavioral1
Sample
e32d54dae55b9312b249bcb02b2d2d83_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e32d54dae55b9312b249bcb02b2d2d83_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e32d54dae55b9312b249bcb02b2d2d83_JaffaCakes118.exe
-
Size
79KB
-
MD5
e32d54dae55b9312b249bcb02b2d2d83
-
SHA1
71b17eabd8cb8c4eda3682560015100483f8e5ec
-
SHA256
75d693fc9d7d0783284ca48c1b366deaebd5554948233ed8ebdb80cc2ae052c3
-
SHA512
b36eaa959c9c55ed80574af5cdf8bb3e78098b3b5b00e6c8a2d571bcf384cc17e625b3c52e00010ede242b0b85565d4b7cf9a9dfb59150e52346f4199604c1c7
-
SSDEEP
1536:EVN9S4A343LR+u+yEfXPqD+ZTIlG4t2yQvOL9cYePa0DJArQ1q5OP4:E0aR+u0XPqD+Z8lG4t2yQvOZ9r1rdOw
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 6 IoCs
resource yara_rule behavioral2/files/0x00070000000234a6-12.dat modiloader_stage2 behavioral2/memory/3668-15-0x00000000004B0000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral2/memory/836-21-0x0000000000400000-0x0000000000413000-memory.dmp modiloader_stage2 behavioral2/memory/3668-23-0x0000000000400000-0x000000000042A000-memory.dmp modiloader_stage2 behavioral2/memory/3668-22-0x00000000004B0000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral2/memory/3668-45-0x00000000004B0000-0x00000000004C3000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation e32d54dae55b9312b249bcb02b2d2d83_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3668 888.exe -
Loads dropped DLL 3 IoCs
pid Process 3668 888.exe 3668 888.exe 836 NOTEPAD.EXE -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SysInfo.dll 888.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e32d54dae55b9312b249bcb02b2d2d83_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 888.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings e32d54dae55b9312b249bcb02b2d2d83_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3668 888.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1672 wrote to memory of 836 1672 e32d54dae55b9312b249bcb02b2d2d83_JaffaCakes118.exe 82 PID 1672 wrote to memory of 836 1672 e32d54dae55b9312b249bcb02b2d2d83_JaffaCakes118.exe 82 PID 1672 wrote to memory of 836 1672 e32d54dae55b9312b249bcb02b2d2d83_JaffaCakes118.exe 82 PID 1672 wrote to memory of 3668 1672 e32d54dae55b9312b249bcb02b2d2d83_JaffaCakes118.exe 83 PID 1672 wrote to memory of 3668 1672 e32d54dae55b9312b249bcb02b2d2d83_JaffaCakes118.exe 83 PID 1672 wrote to memory of 3668 1672 e32d54dae55b9312b249bcb02b2d2d83_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\e32d54dae55b9312b249bcb02b2d2d83_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e32d54dae55b9312b249bcb02b2d2d83_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\新建 文本文档.txt2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\888.exe"C:\Users\Admin\AppData\Local\Temp\888.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD553c56d2de6c5afb1127b469560a944d7
SHA1f6dedb9e129b3cdd17ac1eeaceb1520160e43452
SHA256d7efe5c0b8a175af3f2748a0c36c669fb0ec5bcdec22a526777cff64dc534013
SHA51261775a5b9647365c8b81cc5eeef360728656d7e989ba448efca5826d49999eecff967c137da21754e7d3ee28664363df8773e2637b6cd4e7228f5de62b627ff1
-
Filesize
29KB
MD58b46abddaa1bbc53d4aebccdc3608387
SHA12f395f57d768c2fa430bb7a0ad0f1e13a84e959a
SHA256a5debef775f44aadcea210f80ee55c0bdfa6e74c97b0e26e253efcafa899b4a9
SHA512516e189f216d9fc33875d278e08a44ae84c4d051dc9c73e9aea90780aed1d19a16e0e6444a26521a924fc2865f37235db4f7a3bfba5b37d2bb58330938c8b8d8
-
Filesize
11B
MD52691a2a7f4f47db2258bc2ec63e3f9b5
SHA17c1779f1033459eb4bb2632714ddd24c3ce234b5
SHA256452ace9d6f0f40998dbaba9a7b65644eb193163ba7c289e9814ce030e8926ab1
SHA512b17976095c01a9c78103105fe559a921dcffe47bb2e733c8e20b09f8efd3e8943924783fb22cab066e3d6231cb144f21d9bbb78fac85308e178cc2d43844ffdc