Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 05:09
Static task
static1
Behavioral task
behavioral1
Sample
e61be2f9027b6877ed7b6c1806221b20_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e61be2f9027b6877ed7b6c1806221b20_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e61be2f9027b6877ed7b6c1806221b20_JaffaCakes118.exe
-
Size
733KB
-
MD5
e61be2f9027b6877ed7b6c1806221b20
-
SHA1
325ac04701f2499345060e29e79b5da5a4691e79
-
SHA256
1cb12fdb05f3ff7942e9035d7a914d6949f0381b59da8be9eea9a0a718a5fd8a
-
SHA512
d765bc02b835b60f1c4c37ecc7a765aaf94d2691657efc4c0653fc95dd6c8690383220d2b2364ac265d0e815f62118a08b066e7595d682a806b0f3e989971a82
-
SSDEEP
12288:PMMM2m41D3SJdOEOw0Yugizprg1eMMMvMMM4gHMMMvMMMVf:PMMMV453SPOEOZpE1eMMMvMMMDMMMvMB
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral2/files/0x000700000002341b-26.dat modiloader_stage2 behavioral2/memory/916-27-0x00000000004B0000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral2/memory/2636-33-0x0000000003410000-0x0000000003423000-memory.dmp modiloader_stage2 behavioral2/memory/916-60-0x0000000000400000-0x000000000042A000-memory.dmp modiloader_stage2 behavioral2/memory/916-59-0x00000000004B0000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral2/memory/2636-58-0x0000000003410000-0x0000000003423000-memory.dmp modiloader_stage2 behavioral2/memory/916-86-0x00000000004B0000-0x00000000004C3000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation e61be2f9027b6877ed7b6c1806221b20_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2636 ÅÜÅܱ¦±¦¢ñ8.9.exe 916 kartEar.exe -
Loads dropped DLL 4 IoCs
pid Process 916 kartEar.exe 916 kartEar.exe 2636 ÅÜÅܱ¦±¦¢ñ8.9.exe 2636 ÅÜÅܱ¦±¦¢ñ8.9.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SysInfo.dll kartEar.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÅÜÅܱ¦±¦¢ñ8.9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kartEar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e61be2f9027b6877ed7b6c1806221b20_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2636 ÅÜÅܱ¦±¦¢ñ8.9.exe 2636 ÅÜÅܱ¦±¦¢ñ8.9.exe 916 kartEar.exe 2636 ÅÜÅܱ¦±¦¢ñ8.9.exe 2636 ÅÜÅܱ¦±¦¢ñ8.9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4104 wrote to memory of 2636 4104 e61be2f9027b6877ed7b6c1806221b20_JaffaCakes118.exe 82 PID 4104 wrote to memory of 2636 4104 e61be2f9027b6877ed7b6c1806221b20_JaffaCakes118.exe 82 PID 4104 wrote to memory of 2636 4104 e61be2f9027b6877ed7b6c1806221b20_JaffaCakes118.exe 82 PID 4104 wrote to memory of 916 4104 e61be2f9027b6877ed7b6c1806221b20_JaffaCakes118.exe 83 PID 4104 wrote to memory of 916 4104 e61be2f9027b6877ed7b6c1806221b20_JaffaCakes118.exe 83 PID 4104 wrote to memory of 916 4104 e61be2f9027b6877ed7b6c1806221b20_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\e61be2f9027b6877ed7b6c1806221b20_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e61be2f9027b6877ed7b6c1806221b20_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\ÅÜÅܱ¦±¦¢ñ8.9.exe"C:\Users\Admin\AppData\Local\Temp\ÅÜÅܱ¦±¦¢ñ8.9.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\kartEar.exe"C:\Users\Admin\AppData\Local\Temp\kartEar.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD57f233069396e8a2856a6452a68450d37
SHA1a1deaa0c44d06c7d37b93e0699e2fd1d6da639f5
SHA256e88ea275950c46afb957e8067d698cfdc87ba8436317c00bfaff61b3da71e6c8
SHA512737c66f299c1327036a74f718a2e87955352bb8b2de9d49066dd7706be1bf9cb6c5bdb96145b5784263dd302c6ab26aee17b88779268ec37adce458702b343f7
-
Filesize
29KB
MD532622a50f1d6a8f524fc0b55078d6bb6
SHA176344bcf61db98f54dac18446f469a2b4e7b7a07
SHA25645f67423e4a5034c3f08dce756bf371600f626c56e28c36c23514ce9da108f55
SHA512b5dd552835a1bd8d958d50d7c7856d92b86a029de0b7d891b16fb7e0a5e854346015ccd6da381609edc2ce4fc50eaa3a699502a93c10aa452259800f1ec35d18
-
Filesize
680KB
MD562c4ac2a67576c5177c2ff063e03fcc7
SHA1911ba08049f2d7a803c295f08a14856f3047c32b
SHA256314d84ac77d8cefeec0c644a83365e4df9bbf93c08876e2074498b7272ea3eb6
SHA512c4e56056bf3baa3f237b31ffb8e60ce90939ab920ed09360d7798d7dbaa41e0b02b585ee7d9e5ad5323aa61c8f8a35b336f854313a501f9cd183e9113024ba0a