Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 15:16
Behavioral task
behavioral1
Sample
e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe
-
Size
452KB
-
MD5
e96800ae23a730ccd793032c61fecb96
-
SHA1
0c3456491e07c8c0c63aa5a3c1bf1f49adc85380
-
SHA256
6a881171422294e2d51460e3a47164fdb5dbcaa21820da25748a081985f7736d
-
SHA512
f7f02f405031ac550457fae091e6703eaa09c29e726634fe9ba1232e7a409512a07457c5c21fa30ffb5aabebbf9053de0fa0297d6f81f0eee09f114f6e745085
-
SSDEEP
12288:NhK9DAJVeDDimDeUWmQ2zXSmoLnTuEcLUS:NhKyVgiLUWmQ2zXSmEnTuEcUS
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\System32\\userinit.exe,\"C:\\Users\\Admin\\Favorites\\netservice.exe\"un userinit.exe" e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe -
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral2/files/0x0007000000023426-4.dat modiloader_stage2 behavioral2/files/0x0007000000023427-8.dat modiloader_stage2 behavioral2/memory/4512-13-0x0000000000CB0000-0x0000000000D18000-memory.dmp modiloader_stage2 behavioral2/memory/412-10-0x0000000013140000-0x00000000131B7000-memory.dmp modiloader_stage2 behavioral2/memory/4108-9-0x0000000013140000-0x00000000131B7000-memory.dmp modiloader_stage2 behavioral2/memory/4512-14-0x0000000000CB0000-0x0000000000D18000-memory.dmp modiloader_stage2 behavioral2/memory/4512-16-0x0000000000CB0000-0x0000000000D18000-memory.dmp modiloader_stage2 -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\netrt\Parameters\ServiceDll = "C:\\Windows\\System32\\sysn.dll" e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 412 netservice.exe -
Loads dropped DLL 2 IoCs
pid Process 4512 svchost.exe 4512 svchost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\sysn.dll e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\sysn.dll e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4108 wrote to memory of 412 4108 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 81 PID 4108 wrote to memory of 412 4108 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 81 PID 4108 wrote to memory of 412 4108 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 81 PID 4108 wrote to memory of 2844 4108 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 82 PID 4108 wrote to memory of 2844 4108 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 82 PID 4108 wrote to memory of 2844 4108 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 82 PID 4108 wrote to memory of 1624 4108 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 85 PID 4108 wrote to memory of 1624 4108 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 85 PID 4108 wrote to memory of 1624 4108 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\Favorites\netservice.exeC:\Users\Admin\Favorites\netservice.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:412
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1624
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k network1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
452KB
MD5e96800ae23a730ccd793032c61fecb96
SHA10c3456491e07c8c0c63aa5a3c1bf1f49adc85380
SHA2566a881171422294e2d51460e3a47164fdb5dbcaa21820da25748a081985f7736d
SHA512f7f02f405031ac550457fae091e6703eaa09c29e726634fe9ba1232e7a409512a07457c5c21fa30ffb5aabebbf9053de0fa0297d6f81f0eee09f114f6e745085
-
Filesize
393KB
MD53d604731fc9caa8049b3846428348cce
SHA1891a03ce65b8d4d5ccf1259a3a2e35533556cca1
SHA2563097e98fac6157d231ecec265bf226d39fe9883d1eb548f88b0f43e8c60ebe4c
SHA512dbad9a6bfe1f1fa956bfaeb15e2e178756e7b646a381e4cf4f666db8c8799ca9f06764466bce024aa8b8cabddc483e3a930d1700b10b0136186c9b47542eacb4