Analysis
-
max time kernel
95s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe
-
Size
31KB
-
MD5
ec8a75d9f4a68aba550ed977b4c46338
-
SHA1
5e03b977aa2471ffd0f66f3075614dfcf0d1ea74
-
SHA256
59d6bf9401c5c406397cf29ebe1a3b5c7a071ee4a2c6ff423dfe103b16d06752
-
SHA512
61239cdd94c47dec7078409f3514d34353d8007f8fb7f849c40d83660eedc880c2ea23920a054d9be9c202b3263f312ab004a98fcf06d1f94fd6ca55e3fc9d20
-
SSDEEP
384:sTFJ4v3vhO//Xs15JVVorU8a1wNEz4FLjc8W7Q36umLy2v+3iKwKwjjrAEi:sT7QSk/jfZ0FLHOQ36P7d/vni
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/3928-11-0x0000000000200000-0x000000000020D000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3928 isilis.exe 3416 isilis.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3928 set thread context of 3416 3928 isilis.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3628 3416 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isilis.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 492 wrote to memory of 3928 492 ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe 82 PID 492 wrote to memory of 3928 492 ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe 82 PID 492 wrote to memory of 3928 492 ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe 82 PID 3928 wrote to memory of 3416 3928 isilis.exe 83 PID 3928 wrote to memory of 3416 3928 isilis.exe 83 PID 3928 wrote to memory of 3416 3928 isilis.exe 83 PID 3928 wrote to memory of 3416 3928 isilis.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Users\Admin\AppData\Local\Temp\isilis.exe"C:\Users\Admin\AppData\Local\Temp\isilis.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\isilis.exe"C:\Users\Admin\AppData\Local\Temp\isilis.exe"3⤵
- Executes dropped EXE
PID:3416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 804⤵
- Program crash
PID:3628
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3416 -ip 34161⤵PID:4640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5f101431a309a8878814cf361b695ff15
SHA17046c3acaa39f67f8a7fe99603781da4efa2d9ef
SHA2564ada327ca2cb6da54dbc8faadc87a77d7741336103c94e9156059610910b6e14
SHA51292ba81b13c23dd91737355bd2669b4dfff8f5f7b7c670dde4527eec87d03ab9b0b154dfa9476ee5769105e16bd1f7a3a81df4e0f07f055f50ecf6e8db26ae5c1