Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe
-
Size
144KB
-
MD5
ea0c4dc00e4d02dc64724179ef8f7fd0
-
SHA1
527b92e6b316b34ee9e1fe70e643fc74ecbb04d5
-
SHA256
810b08134a3a1d41d3875945eefdf1b4956f5b9c45bc105c090cae18a44bd1f3
-
SHA512
a9f7f6aa0669a350959ed36c588c4689d0a28ed5280e495910d77b9f82621da1dd9b6cefd5ab37eca8e9ced027f9acbfa0f3f46114a97c5e4d3454110c4de1d4
-
SSDEEP
3072:b1dlKwgj23+Oz05YoNozDOpXgfRsoOnQbGbgHfmWyw:b1dlZro5yAIRsoOp8eRw
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/files/0x0009000000023457-21.dat modiloader_stage2 behavioral2/memory/3052-27-0x0000000010000000-0x000000001000C000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 3052 final.exe 4304 final.exe 1296 BrainBot.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3052 set thread context of 4304 3052 final.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2676 4304 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language final.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BrainBot.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\£©C¥ änV¡((WZ$GQª,Z¨X|Xª; ™–V_Ü'_S ]ÓOý´Ü.@ÕEoY!:\ÕDq¡ÝWäTÓ¯qàT›¿WÓ§Ù\rÕ˜Y!E!¨X\Óº!2¥(_Ú×çó 5_2ѱo0[5Z=Pƒ:±lŸ×ÑãWs£‹ ÓªËÿÉZ×à345]@ÿª¬%¥ >aÑé^XU-*ÑsI8]¸UÕݬµ @¬îèºÐ9é ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1296 BrainBot.exe 1296 BrainBot.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4004 wrote to memory of 3052 4004 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 82 PID 4004 wrote to memory of 3052 4004 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 82 PID 4004 wrote to memory of 3052 4004 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 82 PID 3052 wrote to memory of 4304 3052 final.exe 83 PID 3052 wrote to memory of 4304 3052 final.exe 83 PID 3052 wrote to memory of 4304 3052 final.exe 83 PID 3052 wrote to memory of 4304 3052 final.exe 83 PID 3052 wrote to memory of 4304 3052 final.exe 83 PID 4004 wrote to memory of 1296 4004 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 85 PID 4004 wrote to memory of 1296 4004 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 85 PID 4004 wrote to memory of 1296 4004 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\final.exe"C:\Users\Admin\AppData\Local\Temp\final.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\final.exeC:\Users\Admin\AppData\Local\Temp\final.exe3⤵
- Executes dropped EXE
PID:4304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 4564⤵
- Program crash
PID:2676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BrainBot.exe"C:\Users\Admin\AppData\Local\Temp\BrainBot.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4304 -ip 43041⤵PID:4488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
644KB
MD5da5299cd50932d6cc414f413cbdd543b
SHA1f50ba031e37217ffdb8d6a533dad26fb9235ba06
SHA256298969cee5167e48e323c202d2b8fa7439f67555aa3d53d71b7ecce09e1c2623
SHA512d91b6fe7b5bfdce114dea23c0b1ea7a97316ca39de42a940b873c227431435445dc681585596eed657328e32068752b34246bb9e6f467fb0a026276d36adb78a
-
Filesize
18KB
MD590a40d88254fcb93545a3b7d6496bdeb
SHA19a14633c30c1d37976b9d9043f042e6d41618c54
SHA256e774da08777b725d352f364255553848ea5cc6b364232c316449d2c10ea098a6
SHA51276a1f853d9a98fc14503a62f8b2a4d951dac2bad17613b88197bd5978b0d645d5be7e02e22cc1a18b63398ade2053ac5a85a34c0bdac868c2b1ee2c5d795864e
-
Filesize
204B
MD5ea5a1e1e3418f169bd4c0abbc9e2aea1
SHA1ef9e2029483f5e2d388578e37bcee91caaa94c9e
SHA256c31ad1a6bccd3d6fd8b3468440df7ff3066b8dec0a40d8d6af2427e3723d8308
SHA512cd4ec2e845885762033910875bdf8726bda45b6bf496bc2222d45a18edfc2976b3c3291f1d9a1a73ad8d83e40491df34e590638dcae6425385e2f4737cae1960