Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 05:32
Static task
static1
Behavioral task
behavioral1
Sample
e625fe4c3312480c67f1e9c1b9192ae8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e625fe4c3312480c67f1e9c1b9192ae8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e625fe4c3312480c67f1e9c1b9192ae8_JaffaCakes118.exe
-
Size
358KB
-
MD5
e625fe4c3312480c67f1e9c1b9192ae8
-
SHA1
14c9ba169345f63a70c1a6d7f99eced41a2086ec
-
SHA256
bd7a3f73ee6a51fa506b71b372a446d87bcc5bd60e5e448850be24fed3b4551b
-
SHA512
da3249ee99dbc5ab3b604263979d5606ec55df037225e78ba567569918cb392db11e57b0b2e44b6db9b89fc1cfb37ca48b1cf6ae554f94ef0bdcf63a80989db2
-
SSDEEP
6144:ulnl2YpyFjiU6XFPf4efCme+I47555/NdxHBO1e+4cAlA3:ZVFj4HNqlM7prswNs
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2392 2380 mshta.exe 30 -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions regsvr32.exe -
Looks for VirtualBox drivers on disk 2 TTPs 1 IoCs
description ioc Process File opened (read-only) C:\WINDOWS\SysWOW64\drivers\VBoxMouse.sys regsvr32.exe -
ModiLoader Second Stage 62 IoCs
resource yara_rule behavioral1/memory/2924-1-0x0000000000400000-0x0000000000460C10-memory.dmp modiloader_stage2 behavioral1/memory/2924-2-0x0000000001E00000-0x0000000001EDC000-memory.dmp modiloader_stage2 behavioral1/memory/2924-4-0x0000000001E00000-0x0000000001EDC000-memory.dmp modiloader_stage2 behavioral1/memory/2924-3-0x0000000000400000-0x0000000000460C10-memory.dmp modiloader_stage2 behavioral1/memory/2924-5-0x0000000001E00000-0x0000000001EDC000-memory.dmp modiloader_stage2 behavioral1/memory/2924-7-0x0000000001E00000-0x0000000001EDC000-memory.dmp modiloader_stage2 behavioral1/memory/2924-6-0x0000000001E00000-0x0000000001EDC000-memory.dmp modiloader_stage2 behavioral1/memory/2924-8-0x0000000001E00000-0x0000000001EDC000-memory.dmp modiloader_stage2 behavioral1/memory/2924-9-0x0000000001E00000-0x0000000001EDC000-memory.dmp modiloader_stage2 behavioral1/memory/2240-15-0x0000000005670000-0x000000000574C000-memory.dmp modiloader_stage2 behavioral1/memory/2912-16-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-17-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2240-19-0x0000000005670000-0x000000000574C000-memory.dmp modiloader_stage2 behavioral1/memory/2912-20-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-23-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-22-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-21-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-50-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-52-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-53-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-51-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-49-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-48-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-47-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-42-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-41-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-40-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-39-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-37-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-36-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-35-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-34-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-33-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-32-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-31-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-30-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-29-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/1872-74-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-73-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-72-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-71-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-70-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-69-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-68-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-67-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-66-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-65-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-64-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-63-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-62-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-61-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-60-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-59-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-58-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-57-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/1872-56-0x00000000002B0000-0x00000000003FA000-memory.dmp modiloader_stage2 behavioral1/memory/2912-28-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-27-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-26-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-25-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-24-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 behavioral1/memory/2912-38-0x0000000000250000-0x000000000039A000-memory.dmp modiloader_stage2 -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools regsvr32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe -
Deletes itself 1 IoCs
pid Process 2912 regsvr32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\AppData\\Local\\f13ff984\\8fc23ade.bat\"" regsvr32.exe -
pid Process 2240 powershell.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum regsvr32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 regsvr32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2240 set thread context of 2912 2240 powershell.exe 35 PID 2912 set thread context of 1872 2912 regsvr32.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e625fe4c3312480c67f1e9c1b9192ae8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl regsvr32.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\d8f425bc regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\d8f425bc\shell regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\d8f425bc\shell\open regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\d8f425bc\shell\open\command regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\d8f425bc\shell\open\command\ = "\"C:\\Windows\\system32\\mshta.exe\" \"javascript:wrId3qyh9=\"OO3QStK\";e23m=new ActiveXObject(\"WScript.Shell\");QIhnhcO0=\"a\";qY1XM=e23m.RegRead(\"HKCU\\\\software\\\\sytpiyfns\\\\urzmxasrur\");fBppL6i=\"XoIZgOej\";eval(qY1XM);gXTkU63=\"BQFD0u\";\"" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.894faf35a regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\.894faf35a\ = "d8f425bc" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2240 powershell.exe 2240 powershell.exe 2240 powershell.exe 2240 powershell.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe 2912 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2240 powershell.exe 2912 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2240 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2240 2392 mshta.exe 32 PID 2392 wrote to memory of 2240 2392 mshta.exe 32 PID 2392 wrote to memory of 2240 2392 mshta.exe 32 PID 2392 wrote to memory of 2240 2392 mshta.exe 32 PID 2240 wrote to memory of 2912 2240 powershell.exe 35 PID 2240 wrote to memory of 2912 2240 powershell.exe 35 PID 2240 wrote to memory of 2912 2240 powershell.exe 35 PID 2240 wrote to memory of 2912 2240 powershell.exe 35 PID 2240 wrote to memory of 2912 2240 powershell.exe 35 PID 2240 wrote to memory of 2912 2240 powershell.exe 35 PID 2240 wrote to memory of 2912 2240 powershell.exe 35 PID 2240 wrote to memory of 2912 2240 powershell.exe 35 PID 2912 wrote to memory of 1872 2912 regsvr32.exe 36 PID 2912 wrote to memory of 1872 2912 regsvr32.exe 36 PID 2912 wrote to memory of 1872 2912 regsvr32.exe 36 PID 2912 wrote to memory of 1872 2912 regsvr32.exe 36 PID 2912 wrote to memory of 1872 2912 regsvr32.exe 36 PID 2912 wrote to memory of 1872 2912 regsvr32.exe 36 PID 2912 wrote to memory of 1872 2912 regsvr32.exe 36 PID 2912 wrote to memory of 1872 2912 regsvr32.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\e625fe4c3312480c67f1e9c1b9192ae8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e625fe4c3312480c67f1e9c1b9192ae8_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2924
-
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" javascript:CprC5t="pq9TrI";n6o=new%20ActiveXObject("WScript.Shell");mMQB2VuD="XLdo4o4k";EP6V9o=n6o.RegRead("HKCU\\software\\SNq76KGS\\TS5TKggiw");IMM2dqu="rG3";eval(EP6V9o);Ahz9Bea="CAas3";1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:kvyy2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe3⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VirtualBox drivers on disk
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Deletes itself
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1872
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5bcfb51791ac49f08f8ffba06515757f3
SHA11900ce8c07e09e5e66c6d13d01f141faadcfb8d7
SHA256ee574743524514e03aa60e30378973b2a28517c7a016ea8d33d961b33e7eabe4
SHA5121bee6ccf63339a7c136fe55d08be9d20a55cee7f32ce1f6caff4d120d9905b6cbdce7e910830524734c123caf92f27ba88e2c342a01b637627c8d02606373f8b
-
Filesize
75B
MD5fbd9ac52d0100dc5b377af826e19d9ae
SHA138bdf4ce46f1d6b56da3278cf4bb4d9cfb642922
SHA2566e672e58a9cd44b8b3dae3056f6677c4ffb11a65a1dab5a351d444c9d8c52dfe
SHA5123c3f3b00bddc551286f1243c41bcba9fe34721bf2569816c095d73c3fbe9b7dc99e32e6ddbb8e0b10d972ceff8b2ac73b513ab75309b677a80bc5d7b0b53c86e