Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 05:23
Behavioral task
behavioral1
Sample
e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe
-
Size
761KB
-
MD5
e8695d72027ca968f326a1fca36aa5cd
-
SHA1
739413f4dbfe307f5dd639fba971eb3ff17cf933
-
SHA256
6ed8c400fd7b148b93a07d35e03914475d6addcd6e728e3158cd98dbf1a329e5
-
SHA512
19ba82a6c5c68db1a0055c4a367ef7eb7b214a3e336264a4d687008360fb439b0ccf2a31f29c4d357c86025da02421a224f243fa020a0213f89bed781198e1db
-
SSDEEP
12288:ePXgBZthC7ipJ795LrWxONWpkfebpwi1ckyk120N6whBKvZzmTNOzIIXi:ePQBrQ695Lyx3qIGw2rNvZzmTk8Iy
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral2/files/0x000100000000002b-9.dat modiloader_stage2 behavioral2/memory/2344-17-0x0000000000400000-0x00000000004C6000-memory.dmp modiloader_stage2 behavioral2/memory/3984-19-0x0000000000790000-0x0000000000856000-memory.dmp modiloader_stage2 behavioral2/memory/2596-21-0x0000000000400000-0x00000000004C6000-memory.dmp modiloader_stage2 behavioral2/memory/2280-20-0x0000000000400000-0x00000000004C6000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2280 OINFOP12.EXE -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\E: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\G: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\K: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\N: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\P: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\W: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\Y: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\B: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\H: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\I: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\J: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\L: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\M: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\R: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\T: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\A: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\V: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\X: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\U: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\Q: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\S: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened (read-only) \??\O: e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created F:\AutoRun.inf e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened for modification F:\AutoRun.inf e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File created C:\AutoRun.inf e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened for modification C:\AutoRun.inf e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_OINFOP12.EXE OINFOP12.EXE File opened for modification C:\Windows\SysWOW64\_OINFOP12.EXE OINFOP12.EXE -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2280 set thread context of 2344 2280 OINFOP12.EXE 83 PID 2280 set thread context of 3984 2280 OINFOP12.EXE 84 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\OINFOP12.EXE e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\OINFOP12.EXE e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4660 2344 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OINFOP12.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3993256480" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132042" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433401967" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3998256406" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{198ECA10-757E-11EF-BFD9-4E01FFCF908D} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31132042" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3993256480" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31132042" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3984 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3984 IEXPLORE.EXE 3984 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2280 2596 e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe 82 PID 2596 wrote to memory of 2280 2596 e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe 82 PID 2596 wrote to memory of 2280 2596 e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe 82 PID 2280 wrote to memory of 2344 2280 OINFOP12.EXE 83 PID 2280 wrote to memory of 2344 2280 OINFOP12.EXE 83 PID 2280 wrote to memory of 2344 2280 OINFOP12.EXE 83 PID 2280 wrote to memory of 2344 2280 OINFOP12.EXE 83 PID 2280 wrote to memory of 2344 2280 OINFOP12.EXE 83 PID 2280 wrote to memory of 3984 2280 OINFOP12.EXE 84 PID 2280 wrote to memory of 3984 2280 OINFOP12.EXE 84 PID 2280 wrote to memory of 3984 2280 OINFOP12.EXE 84 PID 3984 wrote to memory of 2920 3984 IEXPLORE.EXE 87 PID 3984 wrote to memory of 2920 3984 IEXPLORE.EXE 87 PID 3984 wrote to memory of 2920 3984 IEXPLORE.EXE 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\OINFOP12.EXE"C:\Program Files\Common Files\Microsoft Shared\MSINFO\OINFOP12.EXE"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\SVCHOST.EXE"C:\Windows\system32\SVCHOST.EXE"3⤵PID:2344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 124⤵
- Program crash
PID:4660
-
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3984 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2344 -ip 23441⤵PID:3860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD511d549a9f965736dac0f51b2bb27f8ec
SHA1491f5c73df29df17d075e58d720dbcf1c395a7e4
SHA256a15820402b7a564ddc585660c2c7fb4030251b52d9afdf300422647e3481bdf4
SHA5127dda56873e125acf50e16335a79af32635ef7fc510562373f59adba13eee8548a9aa4e5200fdfbd09a64bf5d0c0a143826f7c33485180505edcab450b4065fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD50af22e50aa89dfb1eb8e13a538208468
SHA1c85933c57a53742aa43deab2291faea2ab308770
SHA2565cdc1df4201ed096b0ea7f21710e1a384d3707f44f211d2fd38a03da60be59e3
SHA512128ecfbbc03f630d25bb37d4d34c0093195c27fd531dd461819e82b854e0905af7de9bf76d53b3c521edc72884524e1fe85ea5dd1656b5a5be3c3f1ccde51c5f
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
761KB
MD5e8695d72027ca968f326a1fca36aa5cd
SHA1739413f4dbfe307f5dd639fba971eb3ff17cf933
SHA2566ed8c400fd7b148b93a07d35e03914475d6addcd6e728e3158cd98dbf1a329e5
SHA51219ba82a6c5c68db1a0055c4a367ef7eb7b214a3e336264a4d687008360fb439b0ccf2a31f29c4d357c86025da02421a224f243fa020a0213f89bed781198e1db