Analysis
-
max time kernel
94s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 17:02
Static task
static1
Behavioral task
behavioral1
Sample
f6760b30fc256e6e923b646c9ddd5909_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f6760b30fc256e6e923b646c9ddd5909_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f6760b30fc256e6e923b646c9ddd5909_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
f6760b30fc256e6e923b646c9ddd5909
-
SHA1
8e1f8f9346dd26911584f78ad6ccf361c24289f9
-
SHA256
64695ef72a53eee76b6055e025af7fbed11cf9c38a765503d7b8637e416229a2
-
SHA512
2fedebe7946de24b0b2c6ea24a08e5cec84d9d1758205b5c9b4bb75081b8e5aa3af9d025fb31a7455918214891e3b533c40485944cdd3a997daaa91b1ad88435
-
SSDEEP
24576:RaIMsNScd/taTkBc2quTRMxtBVrYa4P3g0tY6Sa2jCed51z5m/lru15w17+zh4T8:l3IcDa4c2bTRGBVrv4tM19m9ruIJ+7
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/4856-1-0x0000000000401000-0x0000000000403000-memory.dmp modiloader_stage2 behavioral2/memory/4856-26-0x0000000000400000-0x00000000005CE110-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation f6760b30fc256e6e923b646c9ddd5909_JaffaCakes118.exe -
Executes dropped EXE 4 IoCs
pid Process 4412 1.exe 944 winrar-32Bit-400.exe 1480 1.exe 3976 1.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4412 set thread context of 1480 4412 1.exe 84 PID 1480 set thread context of 3976 1480 1.exe 85 -
resource yara_rule behavioral2/memory/1480-27-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1480-32-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1480-44-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1480-30-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6760b30fc256e6e923b646c9ddd5909_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winrar-32Bit-400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3976 1.exe 3976 1.exe 3976 1.exe 3976 1.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4412 1.exe 1480 1.exe 944 winrar-32Bit-400.exe 944 winrar-32Bit-400.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4856 wrote to memory of 4412 4856 f6760b30fc256e6e923b646c9ddd5909_JaffaCakes118.exe 82 PID 4856 wrote to memory of 4412 4856 f6760b30fc256e6e923b646c9ddd5909_JaffaCakes118.exe 82 PID 4856 wrote to memory of 4412 4856 f6760b30fc256e6e923b646c9ddd5909_JaffaCakes118.exe 82 PID 4856 wrote to memory of 944 4856 f6760b30fc256e6e923b646c9ddd5909_JaffaCakes118.exe 83 PID 4856 wrote to memory of 944 4856 f6760b30fc256e6e923b646c9ddd5909_JaffaCakes118.exe 83 PID 4856 wrote to memory of 944 4856 f6760b30fc256e6e923b646c9ddd5909_JaffaCakes118.exe 83 PID 4412 wrote to memory of 1480 4412 1.exe 84 PID 4412 wrote to memory of 1480 4412 1.exe 84 PID 4412 wrote to memory of 1480 4412 1.exe 84 PID 4412 wrote to memory of 1480 4412 1.exe 84 PID 4412 wrote to memory of 1480 4412 1.exe 84 PID 4412 wrote to memory of 1480 4412 1.exe 84 PID 4412 wrote to memory of 1480 4412 1.exe 84 PID 4412 wrote to memory of 1480 4412 1.exe 84 PID 1480 wrote to memory of 3976 1480 1.exe 85 PID 1480 wrote to memory of 3976 1480 1.exe 85 PID 1480 wrote to memory of 3976 1480 1.exe 85 PID 1480 wrote to memory of 3976 1480 1.exe 85 PID 1480 wrote to memory of 3976 1480 1.exe 85 PID 1480 wrote to memory of 3976 1480 1.exe 85 PID 1480 wrote to memory of 3976 1480 1.exe 85 PID 3976 wrote to memory of 3408 3976 1.exe 56 PID 3976 wrote to memory of 3408 3976 1.exe 56 PID 3976 wrote to memory of 3408 3976 1.exe 56 PID 3976 wrote to memory of 3408 3976 1.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\f6760b30fc256e6e923b646c9ddd5909_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6760b30fc256e6e923b646c9ddd5909_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\1.exeC:\Users\Admin\AppData\Local\Temp\1.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\1.exeC:\Users\Admin\AppData\Local\Temp\1.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\winrar-32Bit-400.exe"C:\Users\Admin\AppData\Local\Temp\winrar-32Bit-400.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:944
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286KB
MD5f2c7bcc4b9096a5eb57ed5d1aad3e85d
SHA1bf047b8d9df03689eaa83015bb343e379583b8ba
SHA256d91ecfecbfde91c6646e4bc7783a2df0e77794d36622923973a9f679a77d9e7e
SHA512c5a547d89b23f9b269fbf82548676024c0a24cc9b82669788c8ac1a94d12cda17fdc62e0bba813a9ce631247331f02f64ef17ded7b532c16d8333f925350f8d7
-
Filesize
1.4MB
MD5bff4de14e81eacd66167c017fe1872b1
SHA1e5084a96cfb7c385f0f5a20beb198619cc7f2894
SHA256bf433776706a19de55651786d1b76869f95d109bf020981c5c34bf4cb20e4a15
SHA5127658b64cc7ce337cc11f4f9791f1a2dce33f2c82816f3fb008a3e2eae5f5f359de1650232d114dd9da5717a0fdfde49010f3b9baa94297e45afe75a16f0a2eb7