Analysis
-
max time kernel
125s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 21:23
Static task
static1
Behavioral task
behavioral1
Sample
f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe
-
Size
108KB
-
MD5
f486cf57667a5744f4766845c985b27b
-
SHA1
f03354122b727edc2d9b59c8088b7ac78594f40f
-
SHA256
380cba82072d88e4ae81afaac03b8966b7ec926ec0d57efcd658e36bd89e644d
-
SHA512
df3d4f110567c6a4e511a5d9bfed696d59588fbdd69ffc2bced9782ee982ce6fff31d550540879c4aeeb92e53dcce0af8e97ebb63569b6e70fb7cb1e0d695f18
-
SSDEEP
768:pC38yHB1LhnAty+w1yV3B2xr1ux02VczZLJ7ZjhNW5OE58H6Vd2KFRhdARI3v24/:pCRHR51au8fCzD8jo88bB3EjV2lT20KP
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/1192-36-0x0000000010000000-0x000000001000C000-memory.dmp modiloader_stage2 behavioral2/files/0x0007000000023659-31.dat modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 4988 MSN.EXE 1192 tmp.exe 3412 tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1192 set thread context of 3412 1192 tmp.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2376 3412 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSN.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2528 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4988 MSN.EXE 2528 POWERPNT.EXE 2528 POWERPNT.EXE 2528 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2528 1700 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 89 PID 1700 wrote to memory of 2528 1700 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 89 PID 1700 wrote to memory of 2528 1700 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 89 PID 1700 wrote to memory of 4988 1700 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 90 PID 1700 wrote to memory of 4988 1700 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 90 PID 1700 wrote to memory of 4988 1700 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 90 PID 4988 wrote to memory of 1192 4988 MSN.EXE 91 PID 4988 wrote to memory of 1192 4988 MSN.EXE 91 PID 4988 wrote to memory of 1192 4988 MSN.EXE 91 PID 1192 wrote to memory of 3412 1192 tmp.exe 92 PID 1192 wrote to memory of 3412 1192 tmp.exe 92 PID 1192 wrote to memory of 3412 1192 tmp.exe 92 PID 1192 wrote to memory of 3412 1192 tmp.exe 92 PID 1192 wrote to memory of 3412 1192 tmp.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\LLAMADAMOVISTAR.PPS" /ou ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2528
-
-
C:\MSN.EXE"C:\MSN.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe4⤵
- Executes dropped EXE
PID:3412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 4605⤵
- Program crash
PID:2376
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3412 -ip 34121⤵PID:3064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3840,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=4128 /prefetch:81⤵PID:3696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5c1d7b47d6a04e7219dbbf4f024e07eea
SHA14e4943d54aa9d480f189f5798b85d15d9b0d4393
SHA256a8feede40fdce7fdd13e60b154fb551849627b13b22b37e331028b70750c57a9
SHA512b1eda40aaa4310e688cf227416df9793cfdf1988d2bab285f0efa752f5e941aaf6e50157c8757fb845aa0ad2fc2f7fa1cd33997cf77040fe930c0b6e2d26c289
-
Filesize
43KB
MD5333affe54f121b640c3fa188bdcc092e
SHA1e3e6d11bef382209f1cceb03affdcf73d620a020
SHA2568e8123969b416a868059ac393537ba4399fb62da8ba1de4c8a9b69ed567865a5
SHA5126b2c2ce8fcc673bf4e4b65880cbf5c6093ab9b232719900a922981d393b3c5e761b8430493751b307e5c531034a879c5f17866274b40d158247feefcbc9e3ca8
-
Filesize
19KB
MD502583fa70022a563a7673e0e92d41fea
SHA19e322541ca126ec5efbf2183b115c51c22ffd639
SHA2568ec368aa8bcd5719738e73ba0b20b88a161b2fd17f1287eb22083572311dba89
SHA512609f8021ff55a0dcc9c8a3892a31113d7eacc84f16defbb798003191b9380d4baef35b2f36d13a06bedbcad580fa5989910815d0d273101713bb0d151bbdf313
-
Filesize
460B
MD5861861516f896c28dec758e0abca0bc9
SHA11b363c5b504cb7724936563fa0557913b0966a37
SHA256befb501815fb0d16dc85d6df98b75681bc6b8273526f62236d2c66fa66fc3efb
SHA512ae5a387184a482671910112fbb4cfa4fbd708d911a24e40ca72d5ef0b8f45e9c836a49ee1625a24fedb993e3c2bdbae734d9d787a353f2c0741412b91ad776e3