Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 20:46
Static task
static1
Behavioral task
behavioral1
Sample
ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe
-
Size
213KB
-
MD5
ee64ef4352c48c62fff1f2eaa569c088
-
SHA1
e541f4056451318292df0a975f98e129e78fbd7b
-
SHA256
2c8ab9a3a01f8daf7ab202a00ca015230ef5c500c1f12edd19f5d47426b5b263
-
SHA512
b96481225bdc98e0d15806b476101fb46507ce7999711e8478362c1e43c5f37e0e19eddd052974c57a640d2d1e48b8fb9f9c7520d0d40ee8f67c1c8c56ff78e2
-
SSDEEP
3072:ymlRNnU+CsIcetvEe6pz9gaPD7nGcaoOj6gYxQ8I8Cue4/IjFKxpILA3ViMYA:vU+CsIcetvr8zaa7icaonguQ8G4da8R
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/4376-12-0x0000000000400000-0x00000000004C9000-memory.dmp modiloader_stage2 behavioral2/memory/1832-13-0x0000000000400000-0x00000000004C9000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 4376 scvhost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\scvhost.exe ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\scvhost.exe scvhost.exe File created C:\Windows\SysWOW64\Deleteme.bat ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe File created C:\Windows\SysWOW64\scvhost.exe ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1832 wrote to memory of 4376 1832 ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe 83 PID 1832 wrote to memory of 4376 1832 ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe 83 PID 1832 wrote to memory of 4376 1832 ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe 83 PID 1832 wrote to memory of 1960 1832 ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe 84 PID 1832 wrote to memory of 1960 1832 ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe 84 PID 1832 wrote to memory of 1960 1832 ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\scvhost.exeC:\Windows\system32\scvhost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵
- System Location Discovery: System Language Discovery
PID:1960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5ca5d244f494d020998a461790cf296c5
SHA1b03ce36a4319bea833f8e3dd41b56802c7de9f79
SHA256173725d7ea5d46889700936b1c3dc81120518c43d2f49df1af184a7f14383ceb
SHA5122b8e75faa7f3c899fce067592d788c305d3453f8d3b3d87868a04b8bd40d33a62cb1944b7f36fd46c06ee68d63a6fa3e606a0c1e669a070ed9caacdce0288576
-
Filesize
213KB
MD5ee64ef4352c48c62fff1f2eaa569c088
SHA1e541f4056451318292df0a975f98e129e78fbd7b
SHA2562c8ab9a3a01f8daf7ab202a00ca015230ef5c500c1f12edd19f5d47426b5b263
SHA512b96481225bdc98e0d15806b476101fb46507ce7999711e8478362c1e43c5f37e0e19eddd052974c57a640d2d1e48b8fb9f9c7520d0d40ee8f67c1c8c56ff78e2