Resubmissions
25-09-2024 17:02
240925-vj61tswglq 1024-09-2024 10:56
240924-m1nltavhma 1024-09-2024 10:31
240924-mkb8va1ejk 10Analysis
-
max time kernel
1s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 10:31
Static task
static1
Behavioral task
behavioral1
Sample
f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe
-
Size
623KB
-
MD5
f37083d35c4d2e785a6fb84875cb8331
-
SHA1
fc93143795ae3fb1b81947961d571b1e00fdb4b5
-
SHA256
e1a9f7fad02dc673f6c02f5b1ec82266dc85426941c403750d3c46289feec30c
-
SHA512
5d85335c80d532a22203076f5730ec8518b221f0a1ad89a14e7575a9d8d9b88d414afb72a5ea72a3bec728673d3db0b24cb597bb0da64ce4e03d6140bd602f51
-
SSDEEP
6144:zcP+pnEzMXdO4Qq6Iyh1G6J9bJuYK6wGWZRgdg18LIg7mG58Lxzj2z8ZkiGn1umM:zlnE/zJ9HKIww5AyviGumKuCN
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/files/0x00070000000234cc-20.dat modiloader_stage2 behavioral2/memory/3336-44-0x0000000000400000-0x0000000000427000-memory.dmp modiloader_stage2 -
Executes dropped EXE 5 IoCs
pid Process 1636 KBzrJe4WanwyAG0z4x.exe 460 lob.exe 3780 loc.exe 3336 loe.exe 2668 loe.exe -
Loads dropped DLL 1 IoCs
pid Process 4380 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Vdukuhiqopuhuhiq = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\rorske.dll\",Startup" rundll32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 lob.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3336 set thread context of 2668 3336 loe.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KBzrJe4WanwyAG0z4x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2668 loe.exe 2668 loe.exe 1636 KBzrJe4WanwyAG0z4x.exe 1636 KBzrJe4WanwyAG0z4x.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 460 lob.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1636 KBzrJe4WanwyAG0z4x.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2880 wrote to memory of 1636 2880 f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe 82 PID 2880 wrote to memory of 1636 2880 f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe 82 PID 2880 wrote to memory of 1636 2880 f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe 82 PID 2880 wrote to memory of 460 2880 f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe 83 PID 2880 wrote to memory of 460 2880 f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe 83 PID 2880 wrote to memory of 460 2880 f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe 83 PID 2880 wrote to memory of 3780 2880 f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe 84 PID 2880 wrote to memory of 3780 2880 f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe 84 PID 2880 wrote to memory of 3780 2880 f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe 84 PID 2880 wrote to memory of 3336 2880 f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe 85 PID 2880 wrote to memory of 3336 2880 f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe 85 PID 2880 wrote to memory of 3336 2880 f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe 85 PID 2880 wrote to memory of 1608 2880 f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe 86 PID 2880 wrote to memory of 1608 2880 f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe 86 PID 2880 wrote to memory of 1608 2880 f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe 86 PID 3780 wrote to memory of 4380 3780 loc.exe 88 PID 3780 wrote to memory of 4380 3780 loc.exe 88 PID 3780 wrote to memory of 4380 3780 loc.exe 88 PID 3336 wrote to memory of 2668 3336 loe.exe 89 PID 3336 wrote to memory of 2668 3336 loe.exe 89 PID 3336 wrote to memory of 2668 3336 loe.exe 89 PID 3336 wrote to memory of 2668 3336 loe.exe 89 PID 3336 wrote to memory of 2668 3336 loe.exe 89 PID 3336 wrote to memory of 2668 3336 loe.exe 89 PID 3336 wrote to memory of 2668 3336 loe.exe 89 PID 3336 wrote to memory of 2668 3336 loe.exe 89 PID 3336 wrote to memory of 2668 3336 loe.exe 89 PID 3336 wrote to memory of 2668 3336 loe.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\KBzrJe4WanwyAG0z4x.exeKBzrJe4WanwyAG0z4x.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
C:\Users\Admin\lob.exelob.exe2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:460
-
-
C:\Users\Admin\loc.exeloc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\rorske.dll",Startup3⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4380
-
-
-
C:\Users\Admin\loe.exeloe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\loe.exeloe.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del f37083d35c4d2e785a6fb84875cb8331_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
PID:1608
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD546eec9904342db94f51c0dfa0e3a10d9
SHA1846759eaf3aa75bc91317c9364f4f5f1384cd96f
SHA256125e143157269947d2834d27f02488fc9dc796811c230f8c33f1985e19932153
SHA512a736a8ce1a5bebaba126f768f5109fe4d09a6bac9be840658b72de6cdff3f532db3c5e496871ba1d5c5eebcc58b3b4415798b7cde1bbbcfb5b7230358354c2a4
-
Filesize
156KB
MD50985e2a405cf8989d20f5e126f752c95
SHA11df3f3f6b95b5f6c7ec29b5cdcc0e4e4d837dafd
SHA256807c1ab2f96b44d9a6380e36f61356aa810cbd8bea85f4339ec5f8c0a3458cbd
SHA512ace7323c9662eb57daab10830af30d67c2cc9ef7df78f245b5252f229ea9ac91e96ca2a0fbf17b222d856ddc38bde25385d6cb3e6f96e357e56dd7378e98e5e8
-
Filesize
156KB
MD53c6e55d635236e47cd07d25e977d1fe0
SHA1031053f18defb7dec2628915217e1ac3c1cc5a30
SHA25606de61e82dc2ff277620172fa6513b7c1577df956994b6392a11675aa62b8437
SHA512f263f18c1cffb1555c82d4c6841d81e5799d0a3d900cf2d550670c031eaf824733faeb13fa2900e75af664b0a34ad4f3bee7b0445f7ee02d44cb6e3e8939077e
-
Filesize
178KB
MD5e0a8e618405e52a6cf77476f18938364
SHA1bd8f7d8c5d097cec9d71ebc909bbbbc29040c4c5
SHA256fce212d1951fc71c0663fe94f79142463e99eafd6f93667ccc9ef71f21399fb1
SHA512cccfd7ee58469678dc8cfc731c8b24bfa0cafc5e7f4fbff23bf175b8dec1c9c3c261c5da5ea455829bb612974af077f382e90b6afe4874f8fbd3fe8d223f028c
-
Filesize
105KB
MD5b1c6e87de3686ba109bc6079221470d7
SHA12b669e09a587612a7e21f433968cfddf70ef7de7
SHA25603c579ef791d5a7855e135d2f5392ff533edb6dd5e1b59bfc8085ee2e8f76aa3
SHA5125522f5829b988f05a9ec44c036e9ee291f3cd1ab493ea290cfb37f02613be53c86e886c6361448777efe46d62faa4b23458b3eecd6abaf33793c28c7d0676c5f
-
Filesize
143KB
MD5cfca1423ddb4863c1d288e70252f8b63
SHA1e5bb623d2a15ca203379f390a15622648f2d9adb
SHA2568c977a316988b3e945ff4a9badadd2f68cbcd176c7e1eba5d44d40e404f090a4
SHA512e5e1eea62ad86cf71d1a346254e9f1af66e82e1589401b395e925561f996a9acabac5a36dcd79bfe80725846d9aaf7e69d3cc6c081a76adc7a3606aee298ce7f