Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 09:31
Behavioral task
behavioral1
Sample
e8cfee0d6b806782b539573677462894_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e8cfee0d6b806782b539573677462894_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e8cfee0d6b806782b539573677462894_JaffaCakes118.exe
-
Size
82KB
-
MD5
e8cfee0d6b806782b539573677462894
-
SHA1
14675c8cc5d597c45121c649f9c24db4f0e936dc
-
SHA256
6dc77c44cc9f926705aa069f72a9e3608a07e9e4b87ef352f29bafff7ce42be2
-
SHA512
23abc196c6a4d3770adb7fda32cbacf51cc9d5588c384a5f01239840ebaf9a5d97a3d862b13fa73206106a543426dbd4d7f395a5d604804c69d4bc56e66d90f7
-
SSDEEP
1536:5CGcRjb81YcIpo8Fi0Gkffx2xWHXvmF9HRKw+gL:S8OcGoreZHXvC1RKCL
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/files/0x0008000000023448-5.dat modiloader_stage2 behavioral2/memory/4104-9-0x0000000000400000-0x000000000041B000-memory.dmp modiloader_stage2 behavioral2/memory/2928-14-0x0000000010000000-0x000000001000C000-memory.dmp modiloader_stage2 behavioral2/memory/400-27-0x0000000010000000-0x000000001000C000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation e8cfee0d6b806782b539573677462894_JaffaCakes118.exe -
Executes dropped EXE 4 IoCs
pid Process 2928 Systemloader.exe 1140 Systemloader.exe 400 ctfmon32.exe 2532 ctfmon32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Services M7 = "ctfmon32.exe" Systemloader.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2928 set thread context of 1140 2928 Systemloader.exe 83 PID 400 set thread context of 2532 400 ctfmon32.exe 94 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ctfmon32.exe Systemloader.exe File opened for modification C:\Windows\ctfmon32.exe Systemloader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Systemloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Systemloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8cfee0d6b806782b539573677462894_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4104 wrote to memory of 2928 4104 e8cfee0d6b806782b539573677462894_JaffaCakes118.exe 82 PID 4104 wrote to memory of 2928 4104 e8cfee0d6b806782b539573677462894_JaffaCakes118.exe 82 PID 4104 wrote to memory of 2928 4104 e8cfee0d6b806782b539573677462894_JaffaCakes118.exe 82 PID 2928 wrote to memory of 1140 2928 Systemloader.exe 83 PID 2928 wrote to memory of 1140 2928 Systemloader.exe 83 PID 2928 wrote to memory of 1140 2928 Systemloader.exe 83 PID 2928 wrote to memory of 1140 2928 Systemloader.exe 83 PID 2928 wrote to memory of 1140 2928 Systemloader.exe 83 PID 1140 wrote to memory of 400 1140 Systemloader.exe 93 PID 1140 wrote to memory of 400 1140 Systemloader.exe 93 PID 1140 wrote to memory of 400 1140 Systemloader.exe 93 PID 400 wrote to memory of 2532 400 ctfmon32.exe 94 PID 400 wrote to memory of 2532 400 ctfmon32.exe 94 PID 400 wrote to memory of 2532 400 ctfmon32.exe 94 PID 400 wrote to memory of 2532 400 ctfmon32.exe 94 PID 400 wrote to memory of 2532 400 ctfmon32.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8cfee0d6b806782b539573677462894_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8cfee0d6b806782b539573677462894_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Systemloader.exe"C:\Systemloader.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Systemloader.exeC:\Systemloader.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\ctfmon32.exe"C:\Windows\ctfmon32.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\ctfmon32.exeC:\Windows\ctfmon32.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2532
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5c77dcc7f2749c037dfa8ad8d3865e187
SHA12c9aab9dc22aed651693114d41e29e8d4e0b8510
SHA2561c720034e3a522781e6ed6229f449df5ea7e515b465cf9e69f302f036b3ca4f3
SHA512103fe188d36e05b515a159ea2bbf5d1d5fe68346b0700b987bc380d250ddf20282eef3485e0fac080362822567ace70c292ee0432f802e458b61bcac37f1b28a
-
Filesize
22KB
MD51b58ac36575d9c69123aaba7aef86e8a
SHA121146726066641d70a3f800d339b428f8042f714
SHA256b632e67b6e4b6c417c3e39e1c15ca2762158a01e81a3e5e1157ec6acd379779f
SHA512503ab01530714abf076f786e397e14b0c08e31fe3e3bcb6a0e38c2c767e65cb5c5755f131c426ce290a7bfe73876a3c36225da258db2ca4a5dc583d4aca0af6e