Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 09:10
Static task
static1
Behavioral task
behavioral1
Sample
f5ac6176b3ffcda06b63f6bb2cfdb2f6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5ac6176b3ffcda06b63f6bb2cfdb2f6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f5ac6176b3ffcda06b63f6bb2cfdb2f6_JaffaCakes118.exe
-
Size
932KB
-
MD5
f5ac6176b3ffcda06b63f6bb2cfdb2f6
-
SHA1
44ae9d992a4a05a6ceb41e0125bc81485b7cf7e6
-
SHA256
ca04d3e86dd9da06b44d8afaabfc44669a9a4ee1bf0805a9999c170ebc5cf68d
-
SHA512
c387f1c82bcc98b999a5fe772fd68532030022031c159ae5947bfdcdea8975223291962ce471c6e29e051a251c4906991ab8a7afd9371238ff1f015584fb66b2
-
SSDEEP
24576:Lh/M4dCZ5FHb/LTGS/Wg+J3OIqMWxisk+QmXIVTzY:La4u51yS+g+J3OI1WfknmYu
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/4384-45-0x0000000000400000-0x0000000000515000-memory.dmp modiloader_stage2 behavioral2/memory/3000-48-0x0000000000400000-0x0000000000515000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 4384 schedsvc.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\schedsvc.exe f5ac6176b3ffcda06b63f6bb2cfdb2f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\schedsvc.exe f5ac6176b3ffcda06b63f6bb2cfdb2f6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\schedsvc.exe schedsvc.exe File created C:\Windows\SysWOW64\SgotoDel.bat f5ac6176b3ffcda06b63f6bb2cfdb2f6_JaffaCakes118.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4808 3000 WerFault.exe 81 3144 4384 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5ac6176b3ffcda06b63f6bb2cfdb2f6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schedsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3000 wrote to memory of 4384 3000 f5ac6176b3ffcda06b63f6bb2cfdb2f6_JaffaCakes118.exe 85 PID 3000 wrote to memory of 4384 3000 f5ac6176b3ffcda06b63f6bb2cfdb2f6_JaffaCakes118.exe 85 PID 3000 wrote to memory of 4384 3000 f5ac6176b3ffcda06b63f6bb2cfdb2f6_JaffaCakes118.exe 85 PID 3000 wrote to memory of 1996 3000 f5ac6176b3ffcda06b63f6bb2cfdb2f6_JaffaCakes118.exe 88 PID 3000 wrote to memory of 1996 3000 f5ac6176b3ffcda06b63f6bb2cfdb2f6_JaffaCakes118.exe 88 PID 3000 wrote to memory of 1996 3000 f5ac6176b3ffcda06b63f6bb2cfdb2f6_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5ac6176b3ffcda06b63f6bb2cfdb2f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5ac6176b3ffcda06b63f6bb2cfdb2f6_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 3242⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\schedsvc.exeC:\Windows\system32\schedsvc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 3243⤵
- Program crash
PID:3144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\SgotoDel.bat2⤵
- System Location Discovery: System Language Discovery
PID:1996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3000 -ip 30001⤵PID:3172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4384 -ip 43841⤵PID:2392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD504b1ea6881ea8eb3a597fb93178f084d
SHA194a4463759a92c2a83364ed6f902ac60258eb2ce
SHA256e4a5623b74c4d004456b2769aa3f5131adb5b355e85e910b5620bbc2753e5074
SHA5129e488235188a9f3b1790fc39cdb0197f05198f4aa377bcac22e57f3907b85c3e9f95bdfcbb6cfdb3f411e90f54f1adda2d73f09a58e8c3e3448ac146b2517279
-
Filesize
932KB
MD5f5ac6176b3ffcda06b63f6bb2cfdb2f6
SHA144ae9d992a4a05a6ceb41e0125bc81485b7cf7e6
SHA256ca04d3e86dd9da06b44d8afaabfc44669a9a4ee1bf0805a9999c170ebc5cf68d
SHA512c387f1c82bcc98b999a5fe772fd68532030022031c159ae5947bfdcdea8975223291962ce471c6e29e051a251c4906991ab8a7afd9371238ff1f015584fb66b2