Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:52
Behavioral task
behavioral1
Sample
eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe
-
Size
20KB
-
MD5
eab464e1e1102a980966e85ed343805b
-
SHA1
bb8565653c7cebc946e1ecc5373331550a6cfe5e
-
SHA256
39c9e2a25b79ee2213e4ebd82be4e542d5419784c23f2bc22082323b43cf651f
-
SHA512
7a438abc7a621efd39862fd8009ce07c277cd4ee60467fbcc7c389fdb82bfda4bbcb804794cbc7055c9e81a324dcda072da452c5da896521a11b4c09bf068bb2
-
SSDEEP
384:66kmfvjID+AZ39UgfjZN47SEKUxWXmis9dqsN9d26HJClWt:Bkm2/agdOSvXmisXNz26D
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/1068-2-0x0000000013140000-0x0000000013151000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral2/memory/1068-0-0x0000000013140000-0x0000000013151000-memory.dmp upx behavioral2/memory/3672-1-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/1068-2-0x0000000013140000-0x0000000013151000-memory.dmp upx behavioral2/memory/3672-4-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/3672-6-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/3672-9-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/3672-12-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1068 set thread context of 3672 1068 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 82 -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2724 sc.exe 1772 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3672 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1068 wrote to memory of 3672 1068 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 82 PID 1068 wrote to memory of 3672 1068 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 82 PID 1068 wrote to memory of 3672 1068 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 82 PID 1068 wrote to memory of 3672 1068 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 82 PID 1068 wrote to memory of 3672 1068 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 82 PID 3672 wrote to memory of 4724 3672 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 83 PID 3672 wrote to memory of 4724 3672 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 83 PID 3672 wrote to memory of 4724 3672 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 83 PID 3672 wrote to memory of 4560 3672 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 84 PID 3672 wrote to memory of 4560 3672 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 84 PID 3672 wrote to memory of 4560 3672 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 84 PID 4724 wrote to memory of 4344 4724 net.exe 87 PID 4724 wrote to memory of 4344 4724 net.exe 87 PID 4724 wrote to memory of 4344 4724 net.exe 87 PID 4560 wrote to memory of 4852 4560 net.exe 88 PID 4560 wrote to memory of 4852 4560 net.exe 88 PID 4560 wrote to memory of 4852 4560 net.exe 88 PID 3672 wrote to memory of 2724 3672 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 89 PID 3672 wrote to memory of 2724 3672 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 89 PID 3672 wrote to memory of 2724 3672 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 89 PID 3672 wrote to memory of 1772 3672 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 90 PID 3672 wrote to memory of 1772 3672 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 90 PID 3672 wrote to memory of 1772 3672 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 90 PID 3672 wrote to memory of 2412 3672 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 102 PID 3672 wrote to memory of 2412 3672 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 102 PID 3672 wrote to memory of 2412 3672 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\eab464e1e1102a980966e85ed343805b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵
- System Location Discovery: System Language Discovery
PID:4344
-
-
-
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:4852
-
-
-
C:\Windows\SysWOW64\sc.exesc delete wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Windows\SysWOW64\sc.exesc delete sharedaccess3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\eab464e1e1102a980966e85ed343805b_JaffaCakes118.bat C:\Users\Admin\AppData\Local\Temp\eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\eab464e1e1102a980966e85ed343805b_JaffaCakes118.bat3⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69B
MD5e3b0a4ae48f7cfe95b51f8d3cfd329d0
SHA116d9435d895dcf1680baf5b8ebc6342f561af049
SHA25690423a49e145f44c6cefc80ba4351d04a4eaaee2b86e38aad1d9927fbad3d7bf
SHA5125abd674b6e8896bedacd7e0ae593d49771f5c5a036adab1963a37e38f5f2cf185b157d101e97c6e1572b5ae4dfcbfa0470871b2faa0a8d96c6dae19b1329b9f3