Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 08:08
Static task
static1
Behavioral task
behavioral1
Sample
e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe
-
Size
204KB
-
MD5
e8ace73a999d2903bd2c05f398b10a9d
-
SHA1
d5427899a3565a29a7f0d23a728cba2b9a68ecd5
-
SHA256
9147f94fee44882570ddeb67f85bb69de3b27bfc54a3a16d57db6d9d8ffd88b5
-
SHA512
07b9366e2be0e9943b7c7bc64023fad85f60181c48b71aaaee53c1b82aac3a60ec2c5e79cc6856b6d5b81ac71e812f1d38fe0395329792ea706aa41e16d65199
-
SSDEEP
3072:5kX7jGBkSrwYSjEHrq8Lbph1nf2TW+e4Z+XTwoJ+SfS04FKc942dn70Ds7OCPwN:20kqSjELb3pXf2TRe4ifG9B7pOHN
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral2/memory/4796-19-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 behavioral2/memory/3808-23-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 behavioral2/memory/4024-27-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 behavioral2/memory/4024-33-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 behavioral2/memory/4024-41-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation server.exe -
Executes dropped EXE 3 IoCs
pid Process 4796 server.exe 3808 Winservices.exe 4024 server.exe -
resource yara_rule behavioral2/files/0x0008000000023406-6.dat upx behavioral2/memory/4796-9-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4796-19-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3808-23-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4024-27-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4024-33-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4024-41-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysServices = "C:\\Windows\\Winservices.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysServices = "C:\\Windows\\Winservices.exe" Winservices.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysServices = "C:\\Windows\\Winservices.exe" server.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Winservices.exe server.exe File opened for modification C:\Windows\Winservices.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Winservices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3808 Winservices.exe 4024 server.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4300 wrote to memory of 4796 4300 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 82 PID 4300 wrote to memory of 4796 4300 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 82 PID 4300 wrote to memory of 4796 4300 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 82 PID 4796 wrote to memory of 3808 4796 server.exe 83 PID 4796 wrote to memory of 3808 4796 server.exe 83 PID 4796 wrote to memory of 3808 4796 server.exe 83 PID 4300 wrote to memory of 4024 4300 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 84 PID 4300 wrote to memory of 4024 4300 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 84 PID 4300 wrote to memory of 4024 4300 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\Winservices.exe"C:\Windows\Winservices.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3808
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD5ad5c8b40cc0ccc04bcc77a887c0a4cfd
SHA18724d02a3805b75ac785edd2af91d6c8dd24ff3c
SHA2566c9d0cb6cde626c5e336e9fa06dcb9f1578eb6367c5daf6407176a57f0f3c2ac
SHA5129af31198ecbf4132474d36eda4a30f37771dfbbee277a94ec91d2be9d73d3b3eab9ee756cbf9cc2a70174ddf90e2f0e6fc484f1f0778d0d98cdefc912b4d89f0