Analysis
-
max time kernel
95s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 22:31
Static task
static1
Behavioral task
behavioral1
Sample
ee8d714c4c21bf548b06ef887d5b2e3d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee8d714c4c21bf548b06ef887d5b2e3d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee8d714c4c21bf548b06ef887d5b2e3d_JaffaCakes118.exe
-
Size
270KB
-
MD5
ee8d714c4c21bf548b06ef887d5b2e3d
-
SHA1
8779a258a0e25b41f0c0472898f391a837374615
-
SHA256
5b1bc67d053a4d82fa3e97c2048583c1d27ac4160fc03300a72df4d7e14b68a7
-
SHA512
6c522d1cdca1cb44faf900037b2aff0e65a9e9d735d71bc16b4110960de36d4f83a0affed8546e243cd20775e5a8f82ef5c2e379e084444e0193b0932ebfe17d
-
SSDEEP
6144:8HuXwu/zctqu5+WWpkxhDWT4Z6ckDQ+DvmCC4hlcR5GPvFlT:87uYq/WWCHyT4Pkc+O4PSA
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/624-11-0x0000000000400000-0x00000000004F8000-memory.dmp modiloader_stage2 behavioral2/memory/3676-13-0x0000000000400000-0x00000000004F8000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 624 svchos.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\svchos.exe ee8d714c4c21bf548b06ef887d5b2e3d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svchos.exe ee8d714c4c21bf548b06ef887d5b2e3d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svchos.exe svchos.exe File created C:\Windows\SysWOW64\Deleteme.bat ee8d714c4c21bf548b06ef887d5b2e3d_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee8d714c4c21bf548b06ef887d5b2e3d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3676 wrote to memory of 624 3676 ee8d714c4c21bf548b06ef887d5b2e3d_JaffaCakes118.exe 82 PID 3676 wrote to memory of 624 3676 ee8d714c4c21bf548b06ef887d5b2e3d_JaffaCakes118.exe 82 PID 3676 wrote to memory of 624 3676 ee8d714c4c21bf548b06ef887d5b2e3d_JaffaCakes118.exe 82 PID 3676 wrote to memory of 4936 3676 ee8d714c4c21bf548b06ef887d5b2e3d_JaffaCakes118.exe 83 PID 3676 wrote to memory of 4936 3676 ee8d714c4c21bf548b06ef887d5b2e3d_JaffaCakes118.exe 83 PID 3676 wrote to memory of 4936 3676 ee8d714c4c21bf548b06ef887d5b2e3d_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee8d714c4c21bf548b06ef887d5b2e3d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee8d714c4c21bf548b06ef887d5b2e3d_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\svchos.exeC:\Windows\system32\svchos.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵
- System Location Discovery: System Language Discovery
PID:4936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5f504464a7f76000521bdd87808b94c10
SHA13eca0a24d3d470db2ff8021305af777c4d6e7c1f
SHA2562a59753dbcd0ef12a98f5f3b5038e8a39ae96be3dd3b5763cd831aa8f223d30f
SHA512ad1c21daaa0adb3d561600d2e2e9be34b9e1dcaf488c4cd9bc7be517b60aee804025dfedc9777217488023138ed72017fd0fe24ee7e7e3c0b53b7e4e5c9e6ae3
-
Filesize
270KB
MD5ee8d714c4c21bf548b06ef887d5b2e3d
SHA18779a258a0e25b41f0c0472898f391a837374615
SHA2565b1bc67d053a4d82fa3e97c2048583c1d27ac4160fc03300a72df4d7e14b68a7
SHA5126c522d1cdca1cb44faf900037b2aff0e65a9e9d735d71bc16b4110960de36d4f83a0affed8546e243cd20775e5a8f82ef5c2e379e084444e0193b0932ebfe17d